Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
-
Size
216KB
-
MD5
9cd2c36f8f7bb063cf9d87e417d6733c
-
SHA1
f3dc848bd2f1c99ef5caca715290fe57608058e9
-
SHA256
7b0a319d943664637b7d620b9593823fae5f3a9a737abe494470035f9f2e1fc8
-
SHA512
26de0a3f7bb5263c50c5556d2383ff6f7e5c2760bbd62f50e687f43494789261f151c38e8c927a3912a9e4da3b37b149af9e776d93675edd6c1a11c4e880697d
-
SSDEEP
3072:jEGh0oCl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGclEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE42792D-2D04-46d3-B86F-899C17C420C5} {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{141F7D42-AF92-4644-A74B-DE380F49B646}\stubpath = "C:\\Windows\\{141F7D42-AF92-4644-A74B-DE380F49B646}.exe" {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29167C24-51CE-4802-8A76-B36E9EBCBBB6} {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}\stubpath = "C:\\Windows\\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe" {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326} {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1619B8B-661C-46da-B92F-AF0ED3A77E69} {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E07CB80-76E1-43ed-A586-E5AF67932539} {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}\stubpath = "C:\\Windows\\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe" 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79}\stubpath = "C:\\Windows\\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe" {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83} {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54C11290-4FED-484b-A09E-AEA63E3AC839}\stubpath = "C:\\Windows\\{54C11290-4FED-484b-A09E-AEA63E3AC839}.exe" {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1619B8B-661C-46da-B92F-AF0ED3A77E69}\stubpath = "C:\\Windows\\{B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe" {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E07CB80-76E1-43ed-A586-E5AF67932539}\stubpath = "C:\\Windows\\{7E07CB80-76E1-43ed-A586-E5AF67932539}.exe" {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29167C24-51CE-4802-8A76-B36E9EBCBBB6}\stubpath = "C:\\Windows\\{29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exe" {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9} 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE42792D-2D04-46d3-B86F-899C17C420C5}\stubpath = "C:\\Windows\\{AE42792D-2D04-46d3-B86F-899C17C420C5}.exe" {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}\stubpath = "C:\\Windows\\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe" {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79} {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54C11290-4FED-484b-A09E-AEA63E3AC839} {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{141F7D42-AF92-4644-A74B-DE380F49B646} {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BDA31CB-B9D5-451d-9836-064989298DB1} {141F7D42-AF92-4644-A74B-DE380F49B646}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2BDA31CB-B9D5-451d-9836-064989298DB1}\stubpath = "C:\\Windows\\{2BDA31CB-B9D5-451d-9836-064989298DB1}.exe" {141F7D42-AF92-4644-A74B-DE380F49B646}.exe -
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 2808 {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe 1752 {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe 2420 {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe 1748 {29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe File created C:\Windows\{54C11290-4FED-484b-A09E-AEA63E3AC839}.exe {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe File created C:\Windows\{B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe File created C:\Windows\{7E07CB80-76E1-43ed-A586-E5AF67932539}.exe {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe File created C:\Windows\{AE42792D-2D04-46d3-B86F-899C17C420C5}.exe {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe File created C:\Windows\{141F7D42-AF92-4644-A74B-DE380F49B646}.exe {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe File created C:\Windows\{2BDA31CB-B9D5-451d-9836-064989298DB1}.exe {141F7D42-AF92-4644-A74B-DE380F49B646}.exe File created C:\Windows\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe File created C:\Windows\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe File created C:\Windows\{29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exe {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe File created C:\Windows\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {141F7D42-AF92-4644-A74B-DE380F49B646}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe Token: SeIncBasePriorityPrivilege 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe Token: SeIncBasePriorityPrivilege 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe Token: SeIncBasePriorityPrivilege 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe Token: SeIncBasePriorityPrivilege 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe Token: SeIncBasePriorityPrivilege 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe Token: SeIncBasePriorityPrivilege 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe Token: SeIncBasePriorityPrivilege 2808 {54C11290-4FED-484b-A09E-AEA63E3AC839}.exe Token: SeIncBasePriorityPrivilege 1752 {B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe Token: SeIncBasePriorityPrivilege 2420 {7E07CB80-76E1-43ed-A586-E5AF67932539}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2188 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 28 PID 2316 wrote to memory of 2188 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 28 PID 2316 wrote to memory of 2188 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 28 PID 2316 wrote to memory of 2188 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 28 PID 2316 wrote to memory of 2672 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 29 PID 2316 wrote to memory of 2672 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 29 PID 2316 wrote to memory of 2672 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 29 PID 2316 wrote to memory of 2672 2316 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 29 PID 2188 wrote to memory of 2092 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 30 PID 2188 wrote to memory of 2092 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 30 PID 2188 wrote to memory of 2092 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 30 PID 2188 wrote to memory of 2092 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 30 PID 2188 wrote to memory of 2576 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 31 PID 2188 wrote to memory of 2576 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 31 PID 2188 wrote to memory of 2576 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 31 PID 2188 wrote to memory of 2576 2188 {22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe 31 PID 2092 wrote to memory of 1900 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 34 PID 2092 wrote to memory of 1900 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 34 PID 2092 wrote to memory of 1900 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 34 PID 2092 wrote to memory of 1900 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 34 PID 2092 wrote to memory of 2108 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 35 PID 2092 wrote to memory of 2108 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 35 PID 2092 wrote to memory of 2108 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 35 PID 2092 wrote to memory of 2108 2092 {AE42792D-2D04-46d3-B86F-899C17C420C5}.exe 35 PID 1900 wrote to memory of 792 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 36 PID 1900 wrote to memory of 792 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 36 PID 1900 wrote to memory of 792 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 36 PID 1900 wrote to memory of 792 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 36 PID 1900 wrote to memory of 604 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 37 PID 1900 wrote to memory of 604 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 37 PID 1900 wrote to memory of 604 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 37 PID 1900 wrote to memory of 604 1900 {141F7D42-AF92-4644-A74B-DE380F49B646}.exe 37 PID 792 wrote to memory of 2812 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 38 PID 792 wrote to memory of 2812 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 38 PID 792 wrote to memory of 2812 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 38 PID 792 wrote to memory of 2812 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 38 PID 792 wrote to memory of 2956 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 39 PID 792 wrote to memory of 2956 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 39 PID 792 wrote to memory of 2956 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 39 PID 792 wrote to memory of 2956 792 {2BDA31CB-B9D5-451d-9836-064989298DB1}.exe 39 PID 2812 wrote to memory of 1568 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 40 PID 2812 wrote to memory of 1568 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 40 PID 2812 wrote to memory of 1568 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 40 PID 2812 wrote to memory of 1568 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 40 PID 2812 wrote to memory of 2004 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 41 PID 2812 wrote to memory of 2004 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 41 PID 2812 wrote to memory of 2004 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 41 PID 2812 wrote to memory of 2004 2812 {7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe 41 PID 1568 wrote to memory of 2196 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 42 PID 1568 wrote to memory of 2196 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 42 PID 1568 wrote to memory of 2196 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 42 PID 1568 wrote to memory of 2196 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 42 PID 1568 wrote to memory of 1856 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 43 PID 1568 wrote to memory of 1856 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 43 PID 1568 wrote to memory of 1856 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 43 PID 1568 wrote to memory of 1856 1568 {9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe 43 PID 2196 wrote to memory of 2808 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 44 PID 2196 wrote to memory of 2808 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 44 PID 2196 wrote to memory of 2808 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 44 PID 2196 wrote to memory of 2808 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 44 PID 2196 wrote to memory of 1456 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 45 PID 2196 wrote to memory of 1456 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 45 PID 2196 wrote to memory of 1456 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 45 PID 2196 wrote to memory of 1456 2196 {9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exeC:\Windows\{22AE7F4D-9FDD-432c-9CE3-9F0DE50423B9}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\{AE42792D-2D04-46d3-B86F-899C17C420C5}.exeC:\Windows\{AE42792D-2D04-46d3-B86F-899C17C420C5}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\{141F7D42-AF92-4644-A74B-DE380F49B646}.exeC:\Windows\{141F7D42-AF92-4644-A74B-DE380F49B646}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\{2BDA31CB-B9D5-451d-9836-064989298DB1}.exeC:\Windows\{2BDA31CB-B9D5-451d-9836-064989298DB1}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exeC:\Windows\{7F9C01B7-0B42-41ad-915D-23F36EA8EC79}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exeC:\Windows\{9A4B3BF5-5EAC-456c-851F-F73E4C13BE83}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exeC:\Windows\{9F325E3C-5C0D-476b-9A14-7AA6DC8C2326}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\{54C11290-4FED-484b-A09E-AEA63E3AC839}.exeC:\Windows\{54C11290-4FED-484b-A09E-AEA63E3AC839}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\{B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exeC:\Windows\{B1619B8B-661C-46da-B92F-AF0ED3A77E69}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\{7E07CB80-76E1-43ed-A586-E5AF67932539}.exeC:\Windows\{7E07CB80-76E1-43ed-A586-E5AF67932539}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\{29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exeC:\Windows\{29167C24-51CE-4802-8A76-B36E9EBCBBB6}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E07C~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1619~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54C11~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F325~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A4B3~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7F9C0~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2BDA3~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{141F7~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE427~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{22AE7~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD566d5e32c9303c40a05b37a247a1f72c9
SHA1799c2a88b54236bfcc44fbf936b466bfcf958f60
SHA2569e007b247270b7332874997ee5a43ee206785dc4d3410d2c2b18d648c97abe73
SHA512593877d9aeefc21dac6cb0b9222517280554613a138f1cbd61336037f52b8db9fd2b6122271b0c8c122842102cdfb96f17963b5bd2e271a515c1aad4dac7afd3
-
Filesize
216KB
MD5efdfd839600c39ba9c480bcfb3bbe035
SHA175e6b3553f80faff47bdd64769593e059418b47f
SHA25640802cdccc745d44cfb247d43d04fd6f6e84ab5761d73446a910156ff3633700
SHA51262b1967b9e43c96ca109154351b71cd5b0fc4a3f54c56a8d5e8a6f05f08364f6968affe4800030c60dc5099fa96b22b0962792c55b88d3476b1ef89531f4d12b
-
Filesize
216KB
MD5ac2d33631a821e9c3e3ae4a1b8a3cd13
SHA10371c44a408c47acc27b7d9744ac83e10b08caee
SHA256025c83255c02f741d8087f63d1003b9d021e95e9c0f7b7f529988c4d29ce7bde
SHA512c54d741728f8bc964d683e4b28bfc5186115cfdc40eb22e9b44e12782bb37cc7859a22999d84321e81707b0eee8118fabb38de4c2162053e41b59a316f819d87
-
Filesize
216KB
MD5aa37f3e61c504780d84d2e654e653274
SHA1ab6e66da83cd02eff48e4b0a06d25f14ed4acbc2
SHA256f7ab4f7cea12874d8ae9b72d8829693b2c00a255829a6ce63664b1983578f094
SHA51256e77cb983f3b225d31f7b43d6fe248bd6d85c3063fb2469037cc5f9d48c2bd054570ec56c3f4fe17d2309ab38b2c4d85ab1bc560856dbf59d0c3232c479d923
-
Filesize
216KB
MD56ef9862ca9dde759f243dc3f2dabb0c9
SHA169a51007f60d4f1afd776898898200fc7c600b98
SHA2565a6516520c63fa5645b382e64c5f63945dd99f53144f4b6a0d7c363367653497
SHA5127fc149b1008caf3bc849e70fbc05d427da1c3df7b4bf938fedeb79c13c624d8dcaa7f716c20f2b63fde49b2f7cffb2066804ca99934e4623133da7e1672fe058
-
Filesize
216KB
MD533a3a67ed76c88d7b95a5778e1ddebe5
SHA16642feaabadc60e34d9c7a6d284cef24c9dcd2a5
SHA2564236fd7b763409c0f3c7080066a450a1fa62b29b75d62edded1ba21f4df4cde0
SHA5123471d8f3819e8491fbbe80681668cbcae5493e8699be0d1f08e048b8a316161a848406f57d763bc0005492d5ad90f848a5c6c10dc7ec3f16e658fc542fb42133
-
Filesize
216KB
MD5796041e07b6c574b934407ec74573783
SHA14ad5e05be84bbe8510c8882c4b3f0741d30df980
SHA256cf1545af65e02c024fed5acbeab52df67a162b3695224025ab6393754f27f426
SHA512941ec36f2c7493dc22a90e4d862c757ab98bcc2c086dd8ba09277bea4246ffcadbf12a7971a870dbe6aeaa2f701705aff19e74718caefeb1c03e8ee5b9230fee
-
Filesize
216KB
MD5a9ff6c53e025b45fba9c13c1ac4f5edc
SHA14a43d5da1bdf656d9481dc97c428d95e32fc97f2
SHA2561c669b7f51474a76375d94ee194771a8ac77557deb16514e0b04a94c5729b952
SHA5124e5a2c84e74b86290013f2213085eb4a1090b50ffafcf217d6faff593fa1c6546e797d0fc99320c33973af51a4a56d0cb60a0988558188489e602b4bac43b87a
-
Filesize
216KB
MD5685aef4bc5c3ffcb45a3ced20065002c
SHA1d5bd65a46224c4e579b9add59067341a073dae37
SHA256648b56c093e9f0c4dd05c38387a6ff74be19db002837aa05f4a17575ec6082e3
SHA512667a31a2020253637cf63a8fb0e3bd0969611bdd1aae15f51c1b379c6e6953c4ccc0be93e89c3842016f3ad5961d0c1f10a291f1f797d950cab845a438930c00
-
Filesize
216KB
MD529dd4e118c195699d0bc4de50bdc9cf9
SHA1f1a8587d9603c85e28fe6caccf1d1503126f7e63
SHA2561312e6841fa2b6638d892377539792d30dd6469b339d11d2cc4c546de8608b54
SHA5121ad30a891fca1e5b56ec45413bb73da3b6c08749283f61ac6010fc8010b2f3d8d8b3135cc51cde14b77a67e9118607aab116efdddd93102b1968b2a93adb6a49
-
Filesize
216KB
MD5cc91319bcec254d26bbb84c3bb0b9975
SHA12f22bfe0a2a40fcfed7143b2631d5a2855177e91
SHA256a57a82c4d74db7dcd9b4c029f0492de10e42c354bb8d4e1c04ec333d7d3c7ad5
SHA51222aa42e925302a35de7aea048d8e79336293f68bd6b0df98a8d4ee622e735de4c83cd747879c5d81fe3438983510fe152f4a83aab92635b6efa287e78df6dbb3