Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe
-
Size
204KB
-
MD5
0af04b1464cac136d4751623cb5e9566
-
SHA1
343d724612a6aea0497d209d5e8e9598b3225375
-
SHA256
e4756e309ca934b9f86665f8a9a00b45e0bbe99bb4223fa34f978d897b1c188e
-
SHA512
32d17af415e1072c6832bf99b034571d53a341fd42256ca8488999f803aa3cef1943844a79ba0faf6caee7581379161083a219ddf015feeeadbf0d8b34539b34
-
SSDEEP
1536:1EGh0oVl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oVl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB} 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB}\stubpath = "C:\\Windows\\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe" 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7A62729-0759-4a53-815E-B4CB342A003E} {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{28057D42-9FD9-44be-A731-E7CFE2906F3B} {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{28057D42-9FD9-44be-A731-E7CFE2906F3B}\stubpath = "C:\\Windows\\{28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe" {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2523986D-8B2F-42ab-B862-5111C79B8895} {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C0262A5-0716-4e22-88F8-78A8F813C960} {B7A62729-0759-4a53-815E-B4CB342A003E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB785B52-C94F-44f8-A6A4-68295D389C55}\stubpath = "C:\\Windows\\{EB785B52-C94F-44f8-A6A4-68295D389C55}.exe" {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}\stubpath = "C:\\Windows\\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe" {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2323B13-A5C7-4d74-A183-D116FC0CF429}\stubpath = "C:\\Windows\\{B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe" {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF} {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}\stubpath = "C:\\Windows\\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe" {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696} {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696}\stubpath = "C:\\Windows\\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe" {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C0262A5-0716-4e22-88F8-78A8F813C960}\stubpath = "C:\\Windows\\{8C0262A5-0716-4e22-88F8-78A8F813C960}.exe" {B7A62729-0759-4a53-815E-B4CB342A003E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB785B52-C94F-44f8-A6A4-68295D389C55} {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F} {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}\stubpath = "C:\\Windows\\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe" {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B2323B13-A5C7-4d74-A183-D116FC0CF429} {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2523986D-8B2F-42ab-B862-5111C79B8895}\stubpath = "C:\\Windows\\{2523986D-8B2F-42ab-B862-5111C79B8895}.exe" {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7A62729-0759-4a53-815E-B4CB342A003E}\stubpath = "C:\\Windows\\{B7A62729-0759-4a53-815E-B4CB342A003E}.exe" {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9} {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe -
Deletes itself 1 IoCs
pid Process 1508 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 1184 {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe 3040 {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe 2184 {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe 1992 {2523986D-8B2F-42ab-B862-5111C79B8895}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe File created C:\Windows\{28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe File created C:\Windows\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe File created C:\Windows\{B7A62729-0759-4a53-815E-B4CB342A003E}.exe {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe File created C:\Windows\{EB785B52-C94F-44f8-A6A4-68295D389C55}.exe {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe File created C:\Windows\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe File created C:\Windows\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe File created C:\Windows\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe File created C:\Windows\{2523986D-8B2F-42ab-B862-5111C79B8895}.exe {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe File created C:\Windows\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe File created C:\Windows\{8C0262A5-0716-4e22-88F8-78A8F813C960}.exe {B7A62729-0759-4a53-815E-B4CB342A003E}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B7A62729-0759-4a53-815E-B4CB342A003E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2523986D-8B2F-42ab-B862-5111C79B8895}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe Token: SeIncBasePriorityPrivilege 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe Token: SeIncBasePriorityPrivilege 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe Token: SeIncBasePriorityPrivilege 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe Token: SeIncBasePriorityPrivilege 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe Token: SeIncBasePriorityPrivilege 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe Token: SeIncBasePriorityPrivilege 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe Token: SeIncBasePriorityPrivilege 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe Token: SeIncBasePriorityPrivilege 1184 {B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe Token: SeIncBasePriorityPrivilege 3040 {28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe Token: SeIncBasePriorityPrivilege 2184 {DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 824 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 31 PID 3012 wrote to memory of 824 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 31 PID 3012 wrote to memory of 824 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 31 PID 3012 wrote to memory of 824 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 31 PID 3012 wrote to memory of 1508 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 32 PID 3012 wrote to memory of 1508 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 32 PID 3012 wrote to memory of 1508 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 32 PID 3012 wrote to memory of 1508 3012 2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe 32 PID 824 wrote to memory of 2276 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 33 PID 824 wrote to memory of 2276 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 33 PID 824 wrote to memory of 2276 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 33 PID 824 wrote to memory of 2276 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 33 PID 824 wrote to memory of 2692 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 34 PID 824 wrote to memory of 2692 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 34 PID 824 wrote to memory of 2692 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 34 PID 824 wrote to memory of 2692 824 {863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe 34 PID 2276 wrote to memory of 2728 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 35 PID 2276 wrote to memory of 2728 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 35 PID 2276 wrote to memory of 2728 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 35 PID 2276 wrote to memory of 2728 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 35 PID 2276 wrote to memory of 2332 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 36 PID 2276 wrote to memory of 2332 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 36 PID 2276 wrote to memory of 2332 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 36 PID 2276 wrote to memory of 2332 2276 {1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe 36 PID 2728 wrote to memory of 2916 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 37 PID 2728 wrote to memory of 2916 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 37 PID 2728 wrote to memory of 2916 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 37 PID 2728 wrote to memory of 2916 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 37 PID 2728 wrote to memory of 2752 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 38 PID 2728 wrote to memory of 2752 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 38 PID 2728 wrote to memory of 2752 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 38 PID 2728 wrote to memory of 2752 2728 {B7A62729-0759-4a53-815E-B4CB342A003E}.exe 38 PID 2916 wrote to memory of 2640 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 39 PID 2916 wrote to memory of 2640 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 39 PID 2916 wrote to memory of 2640 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 39 PID 2916 wrote to memory of 2640 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 39 PID 2916 wrote to memory of 3044 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 40 PID 2916 wrote to memory of 3044 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 40 PID 2916 wrote to memory of 3044 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 40 PID 2916 wrote to memory of 3044 2916 {8C0262A5-0716-4e22-88F8-78A8F813C960}.exe 40 PID 2640 wrote to memory of 768 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 41 PID 2640 wrote to memory of 768 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 41 PID 2640 wrote to memory of 768 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 41 PID 2640 wrote to memory of 768 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 41 PID 2640 wrote to memory of 2796 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 42 PID 2640 wrote to memory of 2796 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 42 PID 2640 wrote to memory of 2796 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 42 PID 2640 wrote to memory of 2796 2640 {EB785B52-C94F-44f8-A6A4-68295D389C55}.exe 42 PID 768 wrote to memory of 2352 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 43 PID 768 wrote to memory of 2352 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 43 PID 768 wrote to memory of 2352 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 43 PID 768 wrote to memory of 2352 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 43 PID 768 wrote to memory of 532 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 44 PID 768 wrote to memory of 532 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 44 PID 768 wrote to memory of 532 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 44 PID 768 wrote to memory of 532 768 {E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe 44 PID 2352 wrote to memory of 1184 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 45 PID 2352 wrote to memory of 1184 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 45 PID 2352 wrote to memory of 1184 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 45 PID 2352 wrote to memory of 1184 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 45 PID 2352 wrote to memory of 2780 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 46 PID 2352 wrote to memory of 2780 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 46 PID 2352 wrote to memory of 2780 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 46 PID 2352 wrote to memory of 2780 2352 {951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_0af04b1464cac136d4751623cb5e9566_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exeC:\Windows\{863208F7-A7EB-4b69-91F1-28F64A2D1CBB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exeC:\Windows\{1341E7A9-1AAE-489f-8E7D-C9AE567C3696}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\{B7A62729-0759-4a53-815E-B4CB342A003E}.exeC:\Windows\{B7A62729-0759-4a53-815E-B4CB342A003E}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{8C0262A5-0716-4e22-88F8-78A8F813C960}.exeC:\Windows\{8C0262A5-0716-4e22-88F8-78A8F813C960}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{EB785B52-C94F-44f8-A6A4-68295D389C55}.exeC:\Windows\{EB785B52-C94F-44f8-A6A4-68295D389C55}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exeC:\Windows\{E154FEC9-EB8D-4815-ACA6-E8E3A4C0374F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exeC:\Windows\{951BAD9E-FE10-4a42-8945-FD6BCD5D83F9}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\{B2323B13-A5C7-4d74-A183-D116FC0CF429}.exeC:\Windows\{B2323B13-A5C7-4d74-A183-D116FC0CF429}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1184 -
C:\Windows\{28057D42-9FD9-44be-A731-E7CFE2906F3B}.exeC:\Windows\{28057D42-9FD9-44be-A731-E7CFE2906F3B}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exeC:\Windows\{DA58B511-F07D-4c11-BCA2-E95BA9DA95FF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Windows\{2523986D-8B2F-42ab-B862-5111C79B8895}.exeC:\Windows\{2523986D-8B2F-42ab-B862-5111C79B8895}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA58B~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28057~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2323~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{951BA~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E154F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB785~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C026~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B7A62~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1341E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86320~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD57ee345b69eb78849e02a0e75ac6de14b
SHA1079709b34182f247d2f05ad4fdbba72a67e75001
SHA25625e2f2e0e4a2f1d6e624e931c5f33092c5612a15c7b2fec23c38be429ef6f935
SHA512b39aca1a34df742d5bb5da1b008ff2ee66d1b5b390786b4820fdace46afd134f66439cb6a467911fb6f083f9a0554c648ac0ba76b8d3a676c3f1b7bb511b768f
-
Filesize
204KB
MD5e347b108598a2cadc58464d6ed456cd9
SHA1b34dfb81adc07b9c2990f28140e2a797ebab4e9f
SHA2563acbf3fd17b6c18c8743d0b155f60b9ca74558f404234b40b54936fb433bc7f5
SHA51292097ae27cc20bb5844876164f5e04522d333e9568ae6c4ecf7b3d94ab99ebcfab5160b3766cc8d43f72d257fe9595ff683d96fad3c594bebbb42baaed450ae5
-
Filesize
204KB
MD5b672c97b5a3e930852a07549232b16bb
SHA1be4025851b6b1e35f9f362345d617e4257dfe195
SHA256c08730d69b9797969baed3b280cb63c67299cef2933577de9c431b710d15d189
SHA512270a39934a13ac6289bb618594bb95a6ab04c36d2e4d13114bfb1a22f0bf0efeeda946f23f40514b128d934c4f8f3a7b30acca3180928a57caa1d9b0046aaeef
-
Filesize
204KB
MD5ebe27cc95978318fee07c73d96589250
SHA1ec03678b3014dcccd2252143026a7a98b04c560e
SHA2564869c07119abfcd6b27d24a52a2ec174572959fb2a94f311f32439310a969a4e
SHA51219ce5c7fdee4565a6fbdafb8630a4661dcc9b50ec82a41e6a4dddee28ae6b6df601f2411f15d8f701e301a7d39302a3121a4e03ac3cc340c1eb12d2f071922b3
-
Filesize
204KB
MD5b07d303aa8aa0dd7185b489dea347c14
SHA1eeb0b4c2f0e42b5cdbbd83d39120c88800af4654
SHA256888119837c654d8bf0f3abea72a139e9d47f1fef7906e4f5c5a84157d9b8c11e
SHA5127cc93b5884f202ed2edb5c4a292616c90477c30ac042793f1ea74cd238ae0bfd9da93dd3390db67190d159a82610194f28b984ad94e477f970ba0698958bc4c6
-
Filesize
204KB
MD554498f4163ff39c5501cbc4293e6b373
SHA15d5b57d7f3108f0875ef068505282c7ed68ea3da
SHA256583f389f7bca26829a9a68193d7542a368386f1cf8f217770b1b8edee1f5e309
SHA51251b97fe42a1715f54769ff5bd4b49b4c281e3d981a038311eb358506c3191eafe23f993a58a0850adfe21f954eab4a6b4da021d206a214e136947dcc91899d45
-
Filesize
204KB
MD5efb20b0f3e8f2f704fcddd9be77abe57
SHA106a56e289aab431dc09d563707ee7ad6dc19953f
SHA2567d30c37e12d0d2ec4a1b8aa449fcd59555106dd6239e4e81193b924e67984beb
SHA512b70c8f161b1b30bfc1752b4c553567fceb714b53d74db81f01fdc357139887463762894ced5779dd809ba75a450f5cfe6149cafb874af93e96d32c0e84835f83
-
Filesize
204KB
MD51f0f6792f6f82f100ccfb34fbe98f886
SHA10d1c88baeaae35616bb5a948d801e6ac912a21f0
SHA256734e2bbb31593d0c1abae9444087ee2c4d9defb4eb7ca31211683446a072dc2b
SHA512562c9e1e2d53933af3d4be47f2b5628b5773b49b1aabc09b3e09627051d62416cd22130b57a16aba6e5891c9dc7bc9d82f1fcb2a523939a96c0882a3688457e4
-
Filesize
204KB
MD5d14641e3637967e3ab7bdd39fb4aea56
SHA1bbbe29347523b42dae3607ce31aaeb123e4be794
SHA25666e5d335f160b1f6bdc924742e4a38152d69c003ddc3aa3b0c7268f30703ea3a
SHA5128575efd5c150abada7bba4c249faad2696842e04b344da1c879d0a97c180fa9e35ba817f601e394586223fd8913fbacf70d283b070c6c5c82719541eeb9575b2
-
Filesize
204KB
MD5987693b8adf06961aba6cf0daaa15dd9
SHA1252a3d3bad7884d54b8f3d9bda4315bb4aa76e40
SHA256394210ec5c36b33739314bd5d4b80278868619d5edb6315ad7b1d1352d82d72a
SHA51228f37533da35b2c241ff40a5a1562558e8e00eb6cc230741e6326138d282183de8c4cb2cfee08b9178860e7ff9dd0ec30214e26a6849a5185f80f26d9edcd549
-
Filesize
204KB
MD521d5d2504bda1a543e5ad700f4126e39
SHA14c922effc3ff314d830204e29d1f36dd928aa5d0
SHA256fe359ef2257dff185a5c27d0ad7ef50dbc2995f4f9809d926ed6bdbd26ba66df
SHA51263f835183879276af1f003f55c2cc73e46ec65f3b08ab9f93183cc19779528b0db1b80b4521014e56155ec10b1682c1e4ae4580b9e0fb1c6fb3d99441b2326c3