Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe
-
Size
204KB
-
MD5
86b25fb8369730f05988170d045795a8
-
SHA1
48bd431286e35040e00d575cf6e439e1659cab52
-
SHA256
2995327fd49ea37f2a518b5116f4acb872321dee7b7fad3aa9ea9c445b8a926b
-
SHA512
b842865701c062ac45174ee2602d88a92bee735aa88be78a0333fab4e572a6a423df29d2bf2b015ff8efdf34592a3ce25da24b4aac91669f43231bfd57d3d59a
-
SSDEEP
1536:1EGh0ohl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0ohl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9} {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3AEE1FBB-6E47-4880-8C1F-E23256877476} {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01C40A95-FDAE-4757-A67D-4A9895381957} {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01C40A95-FDAE-4757-A67D-4A9895381957}\stubpath = "C:\\Windows\\{01C40A95-FDAE-4757-A67D-4A9895381957}.exe" {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7934123F-DCC2-441a-AC06-2057B8F23274} {01C40A95-FDAE-4757-A67D-4A9895381957}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A} {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A}\stubpath = "C:\\Windows\\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe" {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C9060B1-B5B7-444b-B38E-805AF3384845}\stubpath = "C:\\Windows\\{8C9060B1-B5B7-444b-B38E-805AF3384845}.exe" {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7934123F-DCC2-441a-AC06-2057B8F23274}\stubpath = "C:\\Windows\\{7934123F-DCC2-441a-AC06-2057B8F23274}.exe" {01C40A95-FDAE-4757-A67D-4A9895381957}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC} {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A5F87E6-5596-497d-A0F5-B99820E41D6B} 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C9060B1-B5B7-444b-B38E-805AF3384845} {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{756EFA5E-D615-47ad-A165-3150D3241F5E}\stubpath = "C:\\Windows\\{756EFA5E-D615-47ad-A165-3150D3241F5E}.exe" {7934123F-DCC2-441a-AC06-2057B8F23274}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9}\stubpath = "C:\\Windows\\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe" {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3AEE1FBB-6E47-4880-8C1F-E23256877476}\stubpath = "C:\\Windows\\{3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe" {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}\stubpath = "C:\\Windows\\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe" {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}\stubpath = "C:\\Windows\\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe" {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5} {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}\stubpath = "C:\\Windows\\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exe" {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4A5F87E6-5596-497d-A0F5-B99820E41D6B}\stubpath = "C:\\Windows\\{4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe" 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{756EFA5E-D615-47ad-A165-3150D3241F5E} {7934123F-DCC2-441a-AC06-2057B8F23274}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D} {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe -
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 376 {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe 2188 {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe 2300 {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe 784 {0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe File created C:\Windows\{01C40A95-FDAE-4757-A67D-4A9895381957}.exe {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe File created C:\Windows\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe File created C:\Windows\{4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe File created C:\Windows\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe File created C:\Windows\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe File created C:\Windows\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe File created C:\Windows\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exe {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe File created C:\Windows\{8C9060B1-B5B7-444b-B38E-805AF3384845}.exe {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe File created C:\Windows\{7934123F-DCC2-441a-AC06-2057B8F23274}.exe {01C40A95-FDAE-4757-A67D-4A9895381957}.exe File created C:\Windows\{756EFA5E-D615-47ad-A165-3150D3241F5E}.exe {7934123F-DCC2-441a-AC06-2057B8F23274}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7934123F-DCC2-441a-AC06-2057B8F23274}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {01C40A95-FDAE-4757-A67D-4A9895381957}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe Token: SeIncBasePriorityPrivilege 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe Token: SeIncBasePriorityPrivilege 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe Token: SeIncBasePriorityPrivilege 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe Token: SeIncBasePriorityPrivilege 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe Token: SeIncBasePriorityPrivilege 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe Token: SeIncBasePriorityPrivilege 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe Token: SeIncBasePriorityPrivilege 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe Token: SeIncBasePriorityPrivilege 376 {756EFA5E-D615-47ad-A165-3150D3241F5E}.exe Token: SeIncBasePriorityPrivilege 2188 {AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe Token: SeIncBasePriorityPrivilege 2300 {E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2728 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 30 PID 1364 wrote to memory of 2728 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 30 PID 1364 wrote to memory of 2728 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 30 PID 1364 wrote to memory of 2728 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 30 PID 1364 wrote to memory of 2808 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 31 PID 1364 wrote to memory of 2808 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 31 PID 1364 wrote to memory of 2808 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 31 PID 1364 wrote to memory of 2808 1364 2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe 31 PID 2728 wrote to memory of 2964 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 32 PID 2728 wrote to memory of 2964 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 32 PID 2728 wrote to memory of 2964 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 32 PID 2728 wrote to memory of 2964 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 32 PID 2728 wrote to memory of 2708 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 33 PID 2728 wrote to memory of 2708 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 33 PID 2728 wrote to memory of 2708 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 33 PID 2728 wrote to memory of 2708 2728 {4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe 33 PID 2964 wrote to memory of 2636 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 34 PID 2964 wrote to memory of 2636 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 34 PID 2964 wrote to memory of 2636 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 34 PID 2964 wrote to memory of 2636 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 34 PID 2964 wrote to memory of 2168 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 35 PID 2964 wrote to memory of 2168 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 35 PID 2964 wrote to memory of 2168 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 35 PID 2964 wrote to memory of 2168 2964 {A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe 35 PID 2636 wrote to memory of 2036 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 36 PID 2636 wrote to memory of 2036 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 36 PID 2636 wrote to memory of 2036 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 36 PID 2636 wrote to memory of 2036 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 36 PID 2636 wrote to memory of 752 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 37 PID 2636 wrote to memory of 752 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 37 PID 2636 wrote to memory of 752 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 37 PID 2636 wrote to memory of 752 2636 {8C9060B1-B5B7-444b-B38E-805AF3384845}.exe 37 PID 2036 wrote to memory of 2156 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 38 PID 2036 wrote to memory of 2156 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 38 PID 2036 wrote to memory of 2156 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 38 PID 2036 wrote to memory of 2156 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 38 PID 2036 wrote to memory of 3016 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 39 PID 2036 wrote to memory of 3016 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 39 PID 2036 wrote to memory of 3016 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 39 PID 2036 wrote to memory of 3016 2036 {AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe 39 PID 2156 wrote to memory of 1100 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 41 PID 2156 wrote to memory of 1100 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 41 PID 2156 wrote to memory of 1100 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 41 PID 2156 wrote to memory of 1100 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 41 PID 2156 wrote to memory of 2552 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 42 PID 2156 wrote to memory of 2552 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 42 PID 2156 wrote to memory of 2552 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 42 PID 2156 wrote to memory of 2552 2156 {3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe 42 PID 1100 wrote to memory of 2836 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 43 PID 1100 wrote to memory of 2836 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 43 PID 1100 wrote to memory of 2836 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 43 PID 1100 wrote to memory of 2836 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 43 PID 1100 wrote to memory of 1672 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 44 PID 1100 wrote to memory of 1672 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 44 PID 1100 wrote to memory of 1672 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 44 PID 1100 wrote to memory of 1672 1100 {01C40A95-FDAE-4757-A67D-4A9895381957}.exe 44 PID 2836 wrote to memory of 376 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 45 PID 2836 wrote to memory of 376 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 45 PID 2836 wrote to memory of 376 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 45 PID 2836 wrote to memory of 376 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 45 PID 2836 wrote to memory of 672 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 46 PID 2836 wrote to memory of 672 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 46 PID 2836 wrote to memory of 672 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 46 PID 2836 wrote to memory of 672 2836 {7934123F-DCC2-441a-AC06-2057B8F23274}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_86b25fb8369730f05988170d045795a8_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\{4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exeC:\Windows\{4A5F87E6-5596-497d-A0F5-B99820E41D6B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exeC:\Windows\{A34D8467-CBD8-40d2-A269-47C3E9CBD66A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\{8C9060B1-B5B7-444b-B38E-805AF3384845}.exeC:\Windows\{8C9060B1-B5B7-444b-B38E-805AF3384845}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exeC:\Windows\{AF4343C1-323E-47d2-BBAA-20C24AF00CE9}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\{3AEE1FBB-6E47-4880-8C1F-E23256877476}.exeC:\Windows\{3AEE1FBB-6E47-4880-8C1F-E23256877476}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\{01C40A95-FDAE-4757-A67D-4A9895381957}.exeC:\Windows\{01C40A95-FDAE-4757-A67D-4A9895381957}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\{7934123F-DCC2-441a-AC06-2057B8F23274}.exeC:\Windows\{7934123F-DCC2-441a-AC06-2057B8F23274}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\{756EFA5E-D615-47ad-A165-3150D3241F5E}.exeC:\Windows\{756EFA5E-D615-47ad-A165-3150D3241F5E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exeC:\Windows\{AA6AF2B3-4884-4776-84F8-7B0FCAD9CB3D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exeC:\Windows\{E38AA1FC-15D3-44a1-AAA0-AF732FA524EC}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exeC:\Windows\{0D56BAE8-E4EA-43ef-8455-5258F7CA18A5}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E38AA~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AA6AF~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{756EF~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79341~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{01C40~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3AEE1~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF434~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C906~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A34D8~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4A5F8~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD555ad29131cc3ab0d4383ac47442ae850
SHA18960f41624ae863aee13e4b07968e99953917e60
SHA256594ff0c76937b86bfacecc72a940fa08fa5e106351b91fc258356372bc9c321b
SHA512790a226e7efeead74e0e4824f58a82105a48b16f97f1742331850efcaae596c99a9813ff4093d351e79d9bc84f0b23aaceeef6ad33be2f727c59eb5c1d3a1f22
-
Filesize
204KB
MD5caef213db88fc9a782397d2de3a7b142
SHA141846ac1bc90ec6fa2c0087fc86f9cb6b93b484c
SHA256b1de68e316042e152d28226ad7fc704f75989ef9013d49098f5b7c020e193622
SHA5122d4c1884d3eff45b158e71dfba2b7740d389de88b2f0308469bbfcc869b7d04fdfdf1c2c7195b03f4ac83a631af6f00057f107c175e3773329da9a2a43375110
-
Filesize
204KB
MD5b65342bece9d7fe7ed103d1b8717ca29
SHA1e54f2c50345fc1f916af6b76502a774e2356fffe
SHA2566b39e855e4e4226129e4ad7f572d90370015053bd7bd889c46fa8e9072f5cefb
SHA512e9cd2e7cd4653203f8229741732e302589bd8d567566fce0c1ddd75a11657c8866e8e435c51def4d3c3185df7db1fda5f487b65029351a0b1304a57066594c6b
-
Filesize
204KB
MD50d1421bd195210ae99a3a0752a9d0f2d
SHA13b28612bedffb9f71c9a6332cf9d6f2203010606
SHA256f452d4de74d0e8181949d2db705e48e81fbd73d69fe221ce0ca0a841f1930a01
SHA5125801c4e644be066db9f05d3905626076a96c982863206985ecde8741121790f137b9471ac7d989aaf6d107a1e5123397305d78c167e5df0068b41db6e38975e5
-
Filesize
204KB
MD5d25afeefe4ac673227bd7d40f44e0ef9
SHA12641e0f8af2c0d19c3595b852e07cbdc378f4b47
SHA25637d02995d3ad8f0b064520d41fda3e89f4d42eb5f301d128665ff356d40fe300
SHA512c0dcc9ccdd59df91d049ecebad68c1083fc99e90fdb497bd2f728f69c60329eaaf1dc07cb6dc0b453a007a9000d6405ff79fc040aeded250888f6fbebb764902
-
Filesize
204KB
MD57df6f5cd91b4d8a5c89a02ca272f3fa6
SHA1d846d10dace6a2ffee2c98b8815b90f3ba046a2b
SHA256cb1e544ecf99633c9a66fe1ff879a756db7d11cb054251e456f4068924d3a756
SHA512c40c65099320d24cf1938af487cf18a687cc8f87071fe60242db1984e2bb819ac1b5f1f0d7ea7bc55981931d539fbae4ab0631214a89f595307407037ace25f3
-
Filesize
204KB
MD5e6b49210ae0be06cbe2db0253cd36918
SHA1894014a742d0410f24db166a33104795714bd498
SHA256722310ff325cab29d82ec99350b5f522309833fccdafb54a41a8f4acdb1dc935
SHA5121f630a2aa789f1553b75bbb3f759fad343e6bd0479db73511d950f8d5cd87171e20cf411eeda3b93c3109e03fd8eeac601eaf08b264d62aa1289a2c89d99f0bb
-
Filesize
204KB
MD57b1dc04d9f255986cccf6d98bce7afe4
SHA17ff493c903a1df7c688578675d6e5a0cc79f7c35
SHA2561fee847e7ee74abd6bd5afa5977430a123bc9deb2b4d5b27fa3f47f4d191f800
SHA5125354cec8d6b34af66f06933c17996c6e8524d948929482b196f6dc52023e8b57223c8dc1995f6cced665814b596d1bfefa08caa049e6ddb0fc6cd472b89d49a4
-
Filesize
204KB
MD518acdba07543933ae2fb655e7c47c244
SHA18580dc32355c02bb872c6ffac16f138a761cb28a
SHA256f3df92dbe613b97994be2952cbdc3badb649777969ab8e25d42cc6051df3e7ff
SHA5124c5b445fa1bc034bd4002fea43fca0236fe06ddc69b5582bf59f209ce557a418b76e209909ce9f3a3f115f2bfd650fd198fc242327a56f4e40f6feacf739fdb0
-
Filesize
204KB
MD55554fc3506b7a686ec782fc0dc0ac928
SHA1485cb75ca7618d13784119b88e194cb48ea2c307
SHA256a92e243754cc753da5688311364628b3677477d3c80ab84993b4994191054ee8
SHA51291b8b591694e7758b1e6b27d88459e1dbfda6bd7e24dcf0a350b3d2b662214b5a8151274b9a7e5ba5204500fbe20edb3a2671b372816cee52aa2675f0be4eae9
-
Filesize
204KB
MD5879d9b9fa2933bd9f198f96c9a835697
SHA1bfcf0d82127c726b43f1f118a89eca636e9da66e
SHA2560ec0df0f3d10f85ec9a425936ea0fbdcc09698666f5310e25b92940cac8de362
SHA512524c8e58bce0c7a4fc515749ea2b68376f0e357550a4af05e2412c840458b8e1a85a49f8fb382cb76865ef68d857323126adf25324f03ed2d5b86fc35ade16db