Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 16:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe
-
Size
344KB
-
MD5
3d14ad92d1e04c5d77ec8f8a4db8a999
-
SHA1
ab8636a84f775ef18f2cb30f66e6dfb7868c23b6
-
SHA256
c2bc3d9e40a9c322f9d4d3330353168b5121c4ce9d2cfb78ae923370efb7e741
-
SHA512
0f2a84cd0a3204c308468eb65bae29f06bcfe221843e66f2754eed750e1baea3944c455ea907a1bbb20e091f1ba23cb456d0f973788fa72baac00f129c15ccda
-
SSDEEP
3072:mEGh0oylEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGElqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7D54909-4637-4596-A3C9-BD9E8EE22A16} {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{410CCEBE-57A5-41d2-A462-337AAC9C90BE} {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20} {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}\stubpath = "C:\\Windows\\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe" {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD} 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}\stubpath = "C:\\Windows\\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe" {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{965A3CCD-478D-4ed6-9DD5-44A8C5465300} {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}\stubpath = "C:\\Windows\\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exe" {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}\stubpath = "C:\\Windows\\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe" {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03} {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}\stubpath = "C:\\Windows\\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe" {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1} {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}\stubpath = "C:\\Windows\\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe" {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7D54909-4637-4596-A3C9-BD9E8EE22A16}\stubpath = "C:\\Windows\\{A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe" {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28810E96-C703-43bb-8BFD-24B07EAA2151}\stubpath = "C:\\Windows\\{28810E96-C703-43bb-8BFD-24B07EAA2151}.exe" {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{410CCEBE-57A5-41d2-A462-337AAC9C90BE}\stubpath = "C:\\Windows\\{410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe" {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}\stubpath = "C:\\Windows\\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe" 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E} {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{965A3CCD-478D-4ed6-9DD5-44A8C5465300}\stubpath = "C:\\Windows\\{965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe" {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5} {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7} {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{28810E96-C703-43bb-8BFD-24B07EAA2151} {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE} {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}\stubpath = "C:\\Windows\\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe" {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe -
Executes dropped EXE 12 IoCs
pid Process 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe 3368 {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe 2956 {0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exe {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe File created C:\Windows\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe File created C:\Windows\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe File created C:\Windows\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe File created C:\Windows\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe File created C:\Windows\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe File created C:\Windows\{965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe File created C:\Windows\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe File created C:\Windows\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe File created C:\Windows\{A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe File created C:\Windows\{28810E96-C703-43bb-8BFD-24B07EAA2151}.exe {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe File created C:\Windows\{410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe Token: SeIncBasePriorityPrivilege 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe Token: SeIncBasePriorityPrivilege 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe Token: SeIncBasePriorityPrivilege 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe Token: SeIncBasePriorityPrivilege 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe Token: SeIncBasePriorityPrivilege 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe Token: SeIncBasePriorityPrivilege 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe Token: SeIncBasePriorityPrivilege 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe Token: SeIncBasePriorityPrivilege 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe Token: SeIncBasePriorityPrivilege 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe Token: SeIncBasePriorityPrivilege 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe Token: SeIncBasePriorityPrivilege 3368 {BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 1848 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 94 PID 3576 wrote to memory of 1848 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 94 PID 3576 wrote to memory of 1848 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 94 PID 3576 wrote to memory of 3488 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 95 PID 3576 wrote to memory of 3488 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 95 PID 3576 wrote to memory of 3488 3576 2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe 95 PID 1848 wrote to memory of 1308 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 96 PID 1848 wrote to memory of 1308 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 96 PID 1848 wrote to memory of 1308 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 96 PID 1848 wrote to memory of 3504 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 97 PID 1848 wrote to memory of 3504 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 97 PID 1848 wrote to memory of 3504 1848 {C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe 97 PID 1308 wrote to memory of 3988 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 100 PID 1308 wrote to memory of 3988 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 100 PID 1308 wrote to memory of 3988 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 100 PID 1308 wrote to memory of 4108 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 101 PID 1308 wrote to memory of 4108 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 101 PID 1308 wrote to memory of 4108 1308 {7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe 101 PID 3988 wrote to memory of 3132 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 102 PID 3988 wrote to memory of 3132 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 102 PID 3988 wrote to memory of 3132 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 102 PID 3988 wrote to memory of 3244 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 103 PID 3988 wrote to memory of 3244 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 103 PID 3988 wrote to memory of 3244 3988 {7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe 103 PID 3132 wrote to memory of 1188 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 104 PID 3132 wrote to memory of 1188 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 104 PID 3132 wrote to memory of 1188 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 104 PID 3132 wrote to memory of 2608 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 105 PID 3132 wrote to memory of 2608 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 105 PID 3132 wrote to memory of 2608 3132 {54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe 105 PID 1188 wrote to memory of 2356 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 106 PID 1188 wrote to memory of 2356 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 106 PID 1188 wrote to memory of 2356 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 106 PID 1188 wrote to memory of 2328 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 107 PID 1188 wrote to memory of 2328 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 107 PID 1188 wrote to memory of 2328 1188 {B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe 107 PID 2356 wrote to memory of 4440 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 108 PID 2356 wrote to memory of 4440 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 108 PID 2356 wrote to memory of 4440 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 108 PID 2356 wrote to memory of 2276 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 109 PID 2356 wrote to memory of 2276 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 109 PID 2356 wrote to memory of 2276 2356 {A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe 109 PID 4440 wrote to memory of 5056 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 110 PID 4440 wrote to memory of 5056 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 110 PID 4440 wrote to memory of 5056 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 110 PID 4440 wrote to memory of 1780 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 111 PID 4440 wrote to memory of 1780 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 111 PID 4440 wrote to memory of 1780 4440 {A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe 111 PID 5056 wrote to memory of 2532 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 112 PID 5056 wrote to memory of 2532 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 112 PID 5056 wrote to memory of 2532 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 112 PID 5056 wrote to memory of 2092 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 113 PID 5056 wrote to memory of 2092 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 113 PID 5056 wrote to memory of 2092 5056 {28810E96-C703-43bb-8BFD-24B07EAA2151}.exe 113 PID 2532 wrote to memory of 3280 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 114 PID 2532 wrote to memory of 3280 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 114 PID 2532 wrote to memory of 3280 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 114 PID 2532 wrote to memory of 3888 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 115 PID 2532 wrote to memory of 3888 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 115 PID 2532 wrote to memory of 3888 2532 {410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe 115 PID 3280 wrote to memory of 3368 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe 116 PID 3280 wrote to memory of 3368 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe 116 PID 3280 wrote to memory of 3368 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe 116 PID 3280 wrote to memory of 4244 3280 {965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_3d14ad92d1e04c5d77ec8f8a4db8a999_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exeC:\Windows\{C1722B49-3658-4c0d-8DF1-EA051E7FD7AD}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exeC:\Windows\{7ADE2C58-62C6-4ac4-B8A8-5E33CFCD0A3E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exeC:\Windows\{7F0F60AC-57DF-40d4-9EFB-77DFE14570AE}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exeC:\Windows\{54E60DA7-00BA-438a-A5E7-E5AEBEF58F03}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exeC:\Windows\{B6F2A812-CFDA-48d9-B2D2-6DB85FC0A3F7}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exeC:\Windows\{A1F999DD-9A8B-4e2d-9984-7A48CFA5F1A1}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\{A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exeC:\Windows\{A7D54909-4637-4596-A3C9-BD9E8EE22A16}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\{28810E96-C703-43bb-8BFD-24B07EAA2151}.exeC:\Windows\{28810E96-C703-43bb-8BFD-24B07EAA2151}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\{410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exeC:\Windows\{410CCEBE-57A5-41d2-A462-337AAC9C90BE}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exeC:\Windows\{965A3CCD-478D-4ed6-9DD5-44A8C5465300}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exeC:\Windows\{BFB9830F-8CF5-4f10-9EAF-7D9B4473FE20}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exeC:\Windows\{0C8BA37D-22F7-41b9-8DF4-FE355FCE2AE5}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BFB98~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{965A3~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{410CC~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28810~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7D54~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1F99~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6F2A~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54E60~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F0F6~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7ADE2~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1722~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD50c42f5db5f342e943dbe9f4241f651d2
SHA128e2cccb87933d3db556826292d5c331c359f9fa
SHA2568c25b90a73ad0a407ff830d0e28919f00c9568747436cd10867476b30599982f
SHA51273f485d04ca7a7db060b7b5e882458a0be6a3874674b77977d0e7820a75c349ecb3a13d72c74712c7dfcae4c6583137d4bbded91b4c351f6a3c28458729bc38e
-
Filesize
344KB
MD5ae0df389628187d159164e7c7ed9948b
SHA1b73a055fd16a950233c4500fa82d0ee7039bfdbe
SHA2564f1afb3358984f2f9d2af8747c9dcc9408f78171e9a1816cd16086eb9d01194a
SHA512285dfa264b87aa0a3b1005e1ae05aee4756ba115c5198998b7ecc90e2b1319740410f4749dd11fb0be20944e2adeba2c4b30db8c4533ae5f7ab630648df5d216
-
Filesize
344KB
MD51a746d3c88a30ba905665edf9c375241
SHA12c69dc91f7b64aa8634d25c818748ab98150623d
SHA256254ad73c33b53470e5e553aceeb03ff01b84f131984d4607a1a07fa057967239
SHA512778671501d61070ffed89ad02454a3d7e6b92228384240c20bfbb65c0580d697eca629c4464a5d70718eca8324dcae1a336967c1581c1674467ecb809cb61a9e
-
Filesize
344KB
MD54f7e49d9af0fc4610dcc19bd1b25b08b
SHA1f0976f73a4342f4771086ede7bcbeeae2b4b7364
SHA256fac92ab55255b832b42d3bbce21032d49e90506380ef5007c44e10e45c0ab49e
SHA51297b1ffa711ffbea15ba8946ae3ce6b3978e10593d40867e401e2fe58151b31f4f77f4f6d8316340d7f5967bbba37a9632801e4dd150ee8432074d773f01578b3
-
Filesize
344KB
MD5e8f92fa45947d930c62fcb04af7326c3
SHA1d3ca4f6407c4ba1c7647d19bb5e3ea6bc6a219ce
SHA2560b45f900d0c8e3fa07ce98c7d22437b9d599f3127f47423b3ce5c73c02738814
SHA5128602b54444bceb033b4a6087b1910aa8c5cd7f353ccb8c5ff8b2d14dc46fa341174961871c860ec1e74890a4e8a42d7103efa687fa4393f60aaf3742f3bf425b
-
Filesize
344KB
MD54bbcadb371e70c306a90d73abf7f7b1f
SHA11437991ba8a04e9058226cd3f46d7fa03bbf962a
SHA256fb0b80bca0543a86d5f3e4c34997f8f7c4ccbfa491cd78b87e5483b386bb1dc0
SHA5126871657014bd687944ea6d1f3b5c78408718d12bfce8378ded74a8e0807363e354e3ce2eadc8a498aa389c31ba3db18ead379e2c3551a4c4f1bcd4c0289e42cb
-
Filesize
344KB
MD594cbb4e1ec0c15eb90fcbb764f931d02
SHA1c1dc0754cd938e224d36ffca48e0c0e3848ea789
SHA256f860d733adbfe98b34d2b07884bba8b1957267663daacf4470c57c054ef09af4
SHA51203a1a691033f1285b3740c6e6a3980a7d937d91141cf64af2fd1ebfa8003c57504ab78af4b35acf92caa10a9ee4500135f497e24b0285a73132a8affa5e7e8bd
-
Filesize
344KB
MD54adebc18cb82222d5948c071e28040bd
SHA16b13fc7c077190bb9264f6664a8733e0fc75eb6c
SHA2565e1bb7efeaef246013d1fe1055e8921f0710911514cfb9a7e0514307602a3c83
SHA51258499c1e8564dbeefb0b426681804991f9c2f26521c2943453ee9d93961bc773427df73a80b9010b26c18cd0e059697f77248da8db55d604d4345304fd69ab75
-
Filesize
344KB
MD5ffd8a3a40c8aef46053a8c1337a41beb
SHA12debc16cee1cbad9e660459d9417069180f7b108
SHA2566bf9768c71dee0354fe89697de8b72be2f52b3ed12155b50d3975390ca02ccd7
SHA512953f8cf249a8d2d858d6046dc6bd900160093f48cb761524abad67b5ea7bc05bb70ac53f1ec17401e4cdc52481a3c6da8fb0724d649988ba8972fd8ee172d5d2
-
Filesize
344KB
MD57acbbffe1f87bc0b0d1043bf94639a88
SHA18e3d2d9ffd8e341fa890ad88c0375c07e3b1c275
SHA2563cbb9c37906e7c6c58032985cc6e26e9f9c53cd5ee94666f276eb4c67273ce6d
SHA5123b900131a5d922835da516284622c1ac15356e242afa4bb6f8c469fee98793f30df832dbb8648333bfce78adae28bb225f41faff29a7e449a02efd1de899ab5e
-
Filesize
344KB
MD5f8863f8a0763534f7c30f4b30d3c71a3
SHA1b2ac7dd950c1254f89d6c0da1aea5c6f290c2be7
SHA2565ca9985e3656987d68c617acc004a4ad46b520e1b5bab3af5f2d84fb549b3701
SHA5120e31b04f9ba47c9aa7085295cb09ab403ef3fa545c4783a2423c66f494b20dba64047ac7374425dfe03a1b6e7fbe3257ac00036b9aeaabe21fcaa35a293e68a4
-
Filesize
344KB
MD513c08fe2aed667f7d37ebaad64cd989e
SHA11847d334fc4cb170a63dd037f205d3b2af9ca363
SHA256481ffadced845b53b2f817eb15c331b345bba5d1a2aea27891952aa73827c0b0
SHA51249d0f17df32ef6ff87ad1d54bf108fe02fa8573ebd786f724f96223a70f8127a6cf9f39eaf84fb66edc6acda4a430df3407c9587958245a644f34ba8c6662925