Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe
-
Size
344KB
-
MD5
1b8e72116f8b31fd62aa3fdaf659dd2e
-
SHA1
eb2cc04ba9b56124ac79ba2a2576b1445d76d622
-
SHA256
fc89de18632cda35e8ba70a93a19ea3fb04fb734169bc704371e5dcc8c55d057
-
SHA512
d5d80d887812d4f59ece1336bfe82d0d6817c514bb2b7ec55b11f7e0275980c9f74a92d2fe1ad6b221f3f838ab8cab3c2d2e9292de51e00cbdd741b31a0b921c
-
SSDEEP
3072:mEGh0oDlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGZlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}\stubpath = "C:\\Windows\\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe" {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88D43EFF-0926-4150-8B03-2193DF04114A}\stubpath = "C:\\Windows\\{88D43EFF-0926-4150-8B03-2193DF04114A}.exe" {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{20F7DB84-2213-48c9-959D-C0EC0CB3B633} {CC944579-64A0-4bc0-A069-BE9D03440246}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E51FAE7-D960-4683-965A-EFBDA85089BA}\stubpath = "C:\\Windows\\{9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe" {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7} {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{075031CA-7AB9-4fb9-9C25-7D389D75442B}\stubpath = "C:\\Windows\\{075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe" {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD} {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08} {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0}\stubpath = "C:\\Windows\\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe" {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC944579-64A0-4bc0-A069-BE9D03440246}\stubpath = "C:\\Windows\\{CC944579-64A0-4bc0-A069-BE9D03440246}.exe" {88D43EFF-0926-4150-8B03-2193DF04114A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1A931EA-A785-473c-94C0-A3C05DC176C2}\stubpath = "C:\\Windows\\{D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe" {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}\stubpath = "C:\\Windows\\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe" {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0} {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88D43EFF-0926-4150-8B03-2193DF04114A} {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC944579-64A0-4bc0-A069-BE9D03440246} {88D43EFF-0926-4150-8B03-2193DF04114A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E51FAE7-D960-4683-965A-EFBDA85089BA} {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1A931EA-A785-473c-94C0-A3C05DC176C2} {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D7070A70-A057-4f09-B7F7-54D6E43E81CA} 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D7070A70-A057-4f09-B7F7-54D6E43E81CA}\stubpath = "C:\\Windows\\{D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe" 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{075031CA-7AB9-4fb9-9C25-7D389D75442B} {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{20F7DB84-2213-48c9-959D-C0EC0CB3B633}\stubpath = "C:\\Windows\\{20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe" {CC944579-64A0-4bc0-A069-BE9D03440246}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}\stubpath = "C:\\Windows\\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exe" {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe -
Deletes itself 1 IoCs
pid Process 2264 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 1548 {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe 2680 {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe 2956 {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe 2784 {A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{88D43EFF-0926-4150-8B03-2193DF04114A}.exe {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe File created C:\Windows\{CC944579-64A0-4bc0-A069-BE9D03440246}.exe {88D43EFF-0926-4150-8B03-2193DF04114A}.exe File created C:\Windows\{D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe File created C:\Windows\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exe {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe File created C:\Windows\{D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe File created C:\Windows\{075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe File created C:\Windows\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe File created C:\Windows\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe File created C:\Windows\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe File created C:\Windows\{20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe {CC944579-64A0-4bc0-A069-BE9D03440246}.exe File created C:\Windows\{9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {88D43EFF-0926-4150-8B03-2193DF04114A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CC944579-64A0-4bc0-A069-BE9D03440246}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe Token: SeIncBasePriorityPrivilege 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe Token: SeIncBasePriorityPrivilege 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe Token: SeIncBasePriorityPrivilege 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe Token: SeIncBasePriorityPrivilege 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe Token: SeIncBasePriorityPrivilege 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe Token: SeIncBasePriorityPrivilege 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe Token: SeIncBasePriorityPrivilege 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe Token: SeIncBasePriorityPrivilege 1548 {20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe Token: SeIncBasePriorityPrivilege 2680 {9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe Token: SeIncBasePriorityPrivilege 2956 {D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1920 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 31 PID 2520 wrote to memory of 1920 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 31 PID 2520 wrote to memory of 1920 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 31 PID 2520 wrote to memory of 1920 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 31 PID 2520 wrote to memory of 2264 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 32 PID 2520 wrote to memory of 2264 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 32 PID 2520 wrote to memory of 2264 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 32 PID 2520 wrote to memory of 2264 2520 2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe 32 PID 1920 wrote to memory of 2740 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 33 PID 1920 wrote to memory of 2740 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 33 PID 1920 wrote to memory of 2740 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 33 PID 1920 wrote to memory of 2740 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 33 PID 1920 wrote to memory of 2888 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 34 PID 1920 wrote to memory of 2888 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 34 PID 1920 wrote to memory of 2888 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 34 PID 1920 wrote to memory of 2888 1920 {D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe 34 PID 2740 wrote to memory of 2780 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 35 PID 2740 wrote to memory of 2780 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 35 PID 2740 wrote to memory of 2780 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 35 PID 2740 wrote to memory of 2780 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 35 PID 2740 wrote to memory of 2912 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 36 PID 2740 wrote to memory of 2912 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 36 PID 2740 wrote to memory of 2912 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 36 PID 2740 wrote to memory of 2912 2740 {075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe 36 PID 2780 wrote to memory of 2764 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 37 PID 2780 wrote to memory of 2764 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 37 PID 2780 wrote to memory of 2764 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 37 PID 2780 wrote to memory of 2764 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 37 PID 2780 wrote to memory of 2896 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 38 PID 2780 wrote to memory of 2896 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 38 PID 2780 wrote to memory of 2896 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 38 PID 2780 wrote to memory of 2896 2780 {C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe 38 PID 2764 wrote to memory of 2156 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 39 PID 2764 wrote to memory of 2156 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 39 PID 2764 wrote to memory of 2156 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 39 PID 2764 wrote to memory of 2156 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 39 PID 2764 wrote to memory of 588 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 40 PID 2764 wrote to memory of 588 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 40 PID 2764 wrote to memory of 588 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 40 PID 2764 wrote to memory of 588 2764 {11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe 40 PID 2156 wrote to memory of 1820 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 41 PID 2156 wrote to memory of 1820 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 41 PID 2156 wrote to memory of 1820 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 41 PID 2156 wrote to memory of 1820 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 41 PID 2156 wrote to memory of 2872 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 42 PID 2156 wrote to memory of 2872 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 42 PID 2156 wrote to memory of 2872 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 42 PID 2156 wrote to memory of 2872 2156 {D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe 42 PID 1820 wrote to memory of 2340 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 43 PID 1820 wrote to memory of 2340 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 43 PID 1820 wrote to memory of 2340 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 43 PID 1820 wrote to memory of 2340 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 43 PID 1820 wrote to memory of 1184 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 44 PID 1820 wrote to memory of 1184 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 44 PID 1820 wrote to memory of 1184 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 44 PID 1820 wrote to memory of 1184 1820 {88D43EFF-0926-4150-8B03-2193DF04114A}.exe 44 PID 2340 wrote to memory of 1548 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 45 PID 2340 wrote to memory of 1548 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 45 PID 2340 wrote to memory of 1548 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 45 PID 2340 wrote to memory of 1548 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 45 PID 2340 wrote to memory of 1808 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 46 PID 2340 wrote to memory of 1808 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 46 PID 2340 wrote to memory of 1808 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 46 PID 2340 wrote to memory of 1808 2340 {CC944579-64A0-4bc0-A069-BE9D03440246}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_1b8e72116f8b31fd62aa3fdaf659dd2e_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\{D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exeC:\Windows\{D7070A70-A057-4f09-B7F7-54D6E43E81CA}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\{075031CA-7AB9-4fb9-9C25-7D389D75442B}.exeC:\Windows\{075031CA-7AB9-4fb9-9C25-7D389D75442B}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exeC:\Windows\{C748CEBC-3CFF-4f51-80D7-EFA086B8DEDD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exeC:\Windows\{11115BAF-1AC2-4bed-8F5A-19CC4BD70D08}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exeC:\Windows\{D20B96F2-362B-476c-90F9-D84F0BB5DEE0}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\{88D43EFF-0926-4150-8B03-2193DF04114A}.exeC:\Windows\{88D43EFF-0926-4150-8B03-2193DF04114A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\{CC944579-64A0-4bc0-A069-BE9D03440246}.exeC:\Windows\{CC944579-64A0-4bc0-A069-BE9D03440246}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\{20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exeC:\Windows\{20F7DB84-2213-48c9-959D-C0EC0CB3B633}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\{9E51FAE7-D960-4683-965A-EFBDA85089BA}.exeC:\Windows\{9E51FAE7-D960-4683-965A-EFBDA85089BA}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\{D1A931EA-A785-473c-94C0-A3C05DC176C2}.exeC:\Windows\{D1A931EA-A785-473c-94C0-A3C05DC176C2}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exeC:\Windows\{A0ADE280-4FE7-4b43-824D-8DAB3109A7D7}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D1A93~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9E51F~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{20F7D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CC944~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88D43~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D20B9~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11115~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C748C~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07503~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7070~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5b80b37c7f7582fe18d718c89298f5427
SHA1b409d72b44f21fe10c05a7c59be6b0197af17832
SHA256477c48a6a3240fa7028dc2917b9aee1112873c258413c4c91742f1a3bdec7bf1
SHA51278272c3e820e05959ff73b02215a781f0aae596736ee3ccc80331dc4223a725cdefc753a086e59b0eca8ca6a2fc739486617499d0e65034095121af535198da4
-
Filesize
344KB
MD5f8cb010e1172962861ca0d3d4f1a5db1
SHA19e17b96869a55cadfe8aeb8278be9d1b89fabe4a
SHA2563d3493d97bd4b13d606c88c093e2786662f7a2474777ef6ab008d42f5a4dc56d
SHA512a697c1893cd5eb9a6f582ffef29a535c0dd0e438d9144a5c940770050c126091e33dbc65c9915514172cd9829e713cab9992a2965debf2b1e359ff32bde21e0e
-
Filesize
344KB
MD5c9de14747bb2dd4f31f7746b47f22090
SHA18a056186e3d16976199a8ebb7a489bb50f74e687
SHA2562da86b28f8c43dcebb36da35b55423986488afc5f4e6c7acb8e00749092f6ffd
SHA512d84d93fb61c95e7c56e7e16a34febe57f8133ea594e699c32243051866cd44ab200a16fac9b3ef7139b0f9bfdef4df64cf83fd813a3a44e1c8d52bc9eb421dc8
-
Filesize
344KB
MD5599601f0107673ce1d87abfe0f003d78
SHA1da24fd979167b34bdfb59b710138774ddfa44088
SHA25637038528ce6a1fb6640be3e4fd8893fe47b39092b99f935ccde401a6bc4c65e3
SHA512fe746eb7198f4c7755332e73e8ea25f6f4e6036fad4a381857cbfc1a0a5c67ae14d9107373ea9600a42e55dc83bce4e81476741a9719ccfaf085f7c9a3e54a17
-
Filesize
344KB
MD5b6a85dd3687407eeac7787857323d130
SHA1864a7263337b03155e1bb33bf6a0a1a271680446
SHA25696629b6aeb0e4c244fb0c7e3d49e22fc955fc28bdf868800b7da572e0e967eed
SHA51203dee4fb48dbfc3e35b902a984190b875c56d0954ca4f0729f234aab42aeb9b8d886b33cbb86ebe0647413ccca882dae73809a69df2d09b1b19bdcd2fdc55c7b
-
Filesize
344KB
MD54b53514c83b8227a9c7482e543a5b4b5
SHA15ae8b3562c1a3445703efe2c4a4e6e58be9ca2c9
SHA256ac887d4fbd4286d154697bdcb287331914dec8fc4a444af73c4001c5224a8411
SHA5121d42e9d732011bda4b95879a5af4edd66a562d5fd8cf131f305bd2b4bf860aca9d00bba071d120a911aea163169e3f9ff1f6bede5cd08e01bbd7faaf917499ca
-
Filesize
344KB
MD58da2f3b7f1e6b94e53f65033bc87761b
SHA13ea14c84f3b56b44d6066483981786ea79203d6f
SHA256950bcc04b3b9db2b09a3e05373c4e27a3bff619c4c0f9d87de80a28c2d85cf82
SHA512b4f3e25add85c6964ddc6648454b57844b925055146083bd7cdd0bb1a3500d8db531cd4c38cc69c191b6edcdc1f680bc97f5839dbf9e29e276348d71fa8c2d7d
-
Filesize
344KB
MD52231f2bd4f7470f387e319006bbb3e98
SHA16c26fe4450eabf946513b2849711190e26516fe5
SHA256f612a7d8d1131121caee39b4f5beefec829ead585389871413196acce5471c85
SHA5125ff223f8b0b033d710584c253b494c58c5cdb0ed965ed5f181c300f6d0f55e7d2b4ee3cee1ce5c22681d3176061cb9e6b0267804959b43e1e913b65b1684c1ad
-
Filesize
344KB
MD5aee9403e3b2c7d8d7681cd7ff1bcd751
SHA1b57e10702b8819f9355c39ea0b80298813ac6b16
SHA256d58dc3152e42beeac1c1787ccc0f727fee8702682175a1ecbe504c2a5e1f737b
SHA5125d771d133d62802fa3f4d78e4190def476ea220c21a9506ac8f94dfa8474799d73966f2810aafbd3dcffb24a8af4ba69e46ea165d078e7a1c9ff363d65d1d690
-
Filesize
344KB
MD54520e71452fa9dda636eb2a9f4599699
SHA1a033244178196f5e44cc19cd9e67c11125e01994
SHA2568593e28bd1e226995fa33ec6e8cd7ad89b4f587afa849bf21db3d54c73712b87
SHA5124051e191f0a369c7f520797ff12ffbf317e1eed65a025590f8f44ae779feca27e60660c5af5632bc3ccb25dc5c9cdbee0b35096115b7b37589d049d3b10f6173
-
Filesize
344KB
MD56912b298e0e11caece819785efcf2f5f
SHA1a2bbff14af10c34d83aa8c18eb5eedba0d2960d7
SHA256c2446692da892739fe3414cf47b5b6ccbbcbe2b5c7a6e513c0158191f4c35297
SHA512946ae318b009d94f10400339f6e226cef8046bd68bb87832b5529718edbcd7e0840500a18abaea8d4ed110c42a8508f093f1e3e9142cad161fb8cfa16ba5c835