Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe
-
Size
216KB
-
MD5
9cd2c36f8f7bb063cf9d87e417d6733c
-
SHA1
f3dc848bd2f1c99ef5caca715290fe57608058e9
-
SHA256
7b0a319d943664637b7d620b9593823fae5f3a9a737abe494470035f9f2e1fc8
-
SHA512
26de0a3f7bb5263c50c5556d2383ff6f7e5c2760bbd62f50e687f43494789261f151c38e8c927a3912a9e4da3b37b149af9e776d93675edd6c1a11c4e880697d
-
SSDEEP
3072:jEGh0oCl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGclEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A06056D3-8004-4259-BAED-44439EE19862}\stubpath = "C:\\Windows\\{A06056D3-8004-4259-BAED-44439EE19862}.exe" {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}\stubpath = "C:\\Windows\\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe" 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681} {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF10085A-B5CB-451f-A4E6-A4DBA547488A} {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E9677CC0-9B74-42f2-A7A8-AAF02D014327} {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E9677CC0-9B74-42f2-A7A8-AAF02D014327}\stubpath = "C:\\Windows\\{E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe" {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A06056D3-8004-4259-BAED-44439EE19862} {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681}\stubpath = "C:\\Windows\\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe" {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF10085A-B5CB-451f-A4E6-A4DBA547488A}\stubpath = "C:\\Windows\\{EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe" {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85}\stubpath = "C:\\Windows\\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe" {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF} {A06056D3-8004-4259-BAED-44439EE19862}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4} 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01} {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01}\stubpath = "C:\\Windows\\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe" {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}\stubpath = "C:\\Windows\\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe" {A06056D3-8004-4259-BAED-44439EE19862}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}\stubpath = "C:\\Windows\\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe" {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9241B80-7082-44bc-9126-37550246A25C} {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5} {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}\stubpath = "C:\\Windows\\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe" {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85} {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5} {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}\stubpath = "C:\\Windows\\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe" {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B} {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C9241B80-7082-44bc-9126-37550246A25C}\stubpath = "C:\\Windows\\{C9241B80-7082-44bc-9126-37550246A25C}.exe" {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe -
Executes dropped EXE 12 IoCs
pid Process 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe 4820 {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe 2480 {C9241B80-7082-44bc-9126-37550246A25C}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe File created C:\Windows\{A06056D3-8004-4259-BAED-44439EE19862}.exe {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe File created C:\Windows\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe {A06056D3-8004-4259-BAED-44439EE19862}.exe File created C:\Windows\{C9241B80-7082-44bc-9126-37550246A25C}.exe {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe File created C:\Windows\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe File created C:\Windows\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe File created C:\Windows\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe File created C:\Windows\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe File created C:\Windows\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe File created C:\Windows\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe File created C:\Windows\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe File created C:\Windows\{E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C9241B80-7082-44bc-9126-37550246A25C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A06056D3-8004-4259-BAED-44439EE19862}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe Token: SeIncBasePriorityPrivilege 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe Token: SeIncBasePriorityPrivilege 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe Token: SeIncBasePriorityPrivilege 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe Token: SeIncBasePriorityPrivilege 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe Token: SeIncBasePriorityPrivilege 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe Token: SeIncBasePriorityPrivilege 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe Token: SeIncBasePriorityPrivilege 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe Token: SeIncBasePriorityPrivilege 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe Token: SeIncBasePriorityPrivilege 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe Token: SeIncBasePriorityPrivilege 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe Token: SeIncBasePriorityPrivilege 4820 {C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3204 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 93 PID 1136 wrote to memory of 3204 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 93 PID 1136 wrote to memory of 3204 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 93 PID 1136 wrote to memory of 3764 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 94 PID 1136 wrote to memory of 3764 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 94 PID 1136 wrote to memory of 3764 1136 2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe 94 PID 3204 wrote to memory of 1032 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 95 PID 3204 wrote to memory of 1032 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 95 PID 3204 wrote to memory of 1032 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 95 PID 3204 wrote to memory of 5044 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 96 PID 3204 wrote to memory of 5044 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 96 PID 3204 wrote to memory of 5044 3204 {51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe 96 PID 1032 wrote to memory of 4644 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 99 PID 1032 wrote to memory of 4644 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 99 PID 1032 wrote to memory of 4644 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 99 PID 1032 wrote to memory of 1744 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 100 PID 1032 wrote to memory of 1744 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 100 PID 1032 wrote to memory of 1744 1032 {8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe 100 PID 4644 wrote to memory of 3568 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 101 PID 4644 wrote to memory of 3568 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 101 PID 4644 wrote to memory of 3568 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 101 PID 4644 wrote to memory of 4240 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 102 PID 4644 wrote to memory of 4240 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 102 PID 4644 wrote to memory of 4240 4644 {8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe 102 PID 3568 wrote to memory of 4376 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 103 PID 3568 wrote to memory of 4376 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 103 PID 3568 wrote to memory of 4376 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 103 PID 3568 wrote to memory of 1444 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 104 PID 3568 wrote to memory of 1444 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 104 PID 3568 wrote to memory of 1444 3568 {CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe 104 PID 4376 wrote to memory of 1532 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 105 PID 4376 wrote to memory of 1532 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 105 PID 4376 wrote to memory of 1532 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 105 PID 4376 wrote to memory of 4348 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 106 PID 4376 wrote to memory of 4348 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 106 PID 4376 wrote to memory of 4348 4376 {EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe 106 PID 1532 wrote to memory of 4736 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 107 PID 1532 wrote to memory of 4736 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 107 PID 1532 wrote to memory of 4736 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 107 PID 1532 wrote to memory of 3352 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 108 PID 1532 wrote to memory of 3352 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 108 PID 1532 wrote to memory of 3352 1532 {63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe 108 PID 4736 wrote to memory of 4404 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 109 PID 4736 wrote to memory of 4404 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 109 PID 4736 wrote to memory of 4404 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 109 PID 4736 wrote to memory of 3636 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 110 PID 4736 wrote to memory of 3636 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 110 PID 4736 wrote to memory of 3636 4736 {E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe 110 PID 4404 wrote to memory of 60 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 111 PID 4404 wrote to memory of 60 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 111 PID 4404 wrote to memory of 60 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 111 PID 4404 wrote to memory of 2260 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 112 PID 4404 wrote to memory of 2260 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 112 PID 4404 wrote to memory of 2260 4404 {E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe 112 PID 60 wrote to memory of 5080 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 113 PID 60 wrote to memory of 5080 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 113 PID 60 wrote to memory of 5080 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 113 PID 60 wrote to memory of 3988 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 114 PID 60 wrote to memory of 3988 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 114 PID 60 wrote to memory of 3988 60 {A06056D3-8004-4259-BAED-44439EE19862}.exe 114 PID 5080 wrote to memory of 4820 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe 115 PID 5080 wrote to memory of 4820 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe 115 PID 5080 wrote to memory of 4820 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe 115 PID 5080 wrote to memory of 3268 5080 {BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-15_9cd2c36f8f7bb063cf9d87e417d6733c_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exeC:\Windows\{51A68C7F-5F14-48b7-9229-41BD7C8ED6A4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exeC:\Windows\{8D8B6B68-EF81-4aa9-B8F3-C851B5064681}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exeC:\Windows\{8FFC7850-12D9-4b01-9F77-D61AFBEACF01}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exeC:\Windows\{CAF5A26F-7E32-4f04-AEBC-CCB87987B3F5}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\{EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exeC:\Windows\{EF10085A-B5CB-451f-A4E6-A4DBA547488A}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exeC:\Windows\{63D96CEC-5E3F-4898-8A61-5EEF059E2D85}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exeC:\Windows\{E42A6E7F-7EDC-48f4-9449-BD98F87DDEB5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\{E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exeC:\Windows\{E9677CC0-9B74-42f2-A7A8-AAF02D014327}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\{A06056D3-8004-4259-BAED-44439EE19862}.exeC:\Windows\{A06056D3-8004-4259-BAED-44439EE19862}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exeC:\Windows\{BFBB95FE-EB1E-4c02-914F-E1BEFDADE8DF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exeC:\Windows\{C19F509D-6C03-4dc1-B6DE-3022BEF71E8B}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\{C9241B80-7082-44bc-9126-37550246A25C}.exeC:\Windows\{C9241B80-7082-44bc-9126-37550246A25C}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C19F5~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BFBB9~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0605~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E9677~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E42A6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63D96~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF100~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAF5A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8FFC7~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D8B6~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{51A68~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5ced74b0d561314c66e99c158ce0c2cc3
SHA1f5e630952d0ec9501fa066397c8b5f69e4cdb71a
SHA256ce40f20052140943d8c9fe06d388a264a7d89508006fc96a151051df3548ef4e
SHA5121eae6d6b819f5e2723ad5dddc44c8312d7316435f48af7421c80f2b486280e847da7184abd1d49356565b9dbb24f2f910616c70229bc0eee68cd1a26fbe070f1
-
Filesize
216KB
MD54a667525a513a45f90ca7b382b79118b
SHA1c0812eeeb74995ce50c37f32f13f8e1fca0df276
SHA2561b1f22047858197a3376fd9d5c7fa84c80d6975c7cef94e3649907a0e56a1cab
SHA5128c107887683516e9a8cb0ae71f578edf8aca3f1c5a140c3fca57326d6a7b27292657397739d93fb75bbfe7da10c1e3010b876937f9121625e543e035fbfdff47
-
Filesize
216KB
MD588c36e9951e2340996cfd2d0b5621c50
SHA164e0dbe619877231590f29970869075dee6e170c
SHA256f0ec180444ba47006f8a862768e6185c625a738ff9f6c53cac77edce77533742
SHA512295acac30303d6e708e9a5520d5602c8567f6a3d689240920adf2401a9c44f36b6fc921fa2436b0becd4a41e180ba33b87711f65d285a29477b64f34fc5a6fae
-
Filesize
216KB
MD52074acdd55db59c847937bc0d66f3574
SHA1e9365eb05492d57a8161aabd37b8ea572e3814f9
SHA25628bf0d899a100027b4ae4f7dbff558165544617eb6f6791dab1c90923a15644e
SHA5122648473b70b52110562e8a164727f36084ed6995653167d1d14fa1543cab5855002dfd45e82ab57dd2492aa7426b2ed5e5b32ec80701ea4ea1b2537ed4b3f065
-
Filesize
216KB
MD5a593fd36959f1b7c21cd64ade9024618
SHA1a45fb509d6b145fbb18b629d035933bb04ff8921
SHA25675be1865f5b8e3234983c56c67a848a1282ce0ef0f7968f87c88a0853fdfae2a
SHA512d187e3141f4a9236bb3b7422c2d57df428fa771bc20df1863e677e9c8b9ca1301e49d231ad490e3f67de6d128857365ca2dd01e784332b64f10a693b5cbee931
-
Filesize
216KB
MD5df3eb8c4346bf8b46b7b95bbba65e034
SHA16de93cdba31a497778646d429a31e9611c5f8e3d
SHA2567a145d148bd647c1ccf5d412acbfc07458c48244b099fcd735de2af747e535f3
SHA512ed5ffbcf568d9ba05fd5ddec8620fde8d2a320552303e347321b4c85d57b53f2c62218a7a463b7cdaa1730e57a899b6ba66642c1abd22fd083c37116eb465aca
-
Filesize
216KB
MD54d564ca77e0385ae744084abf4d43a8c
SHA14cb2e47ee60f2db20b01d1f47f4aed15fecc73e3
SHA256e2549031a40ec089945b1d2e11349b4a1461f67a34287c31ef7dcd10feef12c0
SHA51290732fc0418dee6083625fce0975d2a4c7677b6adaee71ce964a01ee7491e51b72280c12767df3eb0598bbc5c578769b34a9964ab58c252be3e1198a538aaa4e
-
Filesize
216KB
MD5e6006bebb207a0b1a84af991fb308fa2
SHA15a1d80fb704ae91cb425b231f98d44539e843c4d
SHA256739a47aa7390f90c576c2a9605395de95a85d8e27072f719c0641d4374f9920f
SHA51209d91f347b30635b1eb5cc90b23d67f3cce66abc3cf1ed1634f3706ac364d17051321274165c176d1a59e62505bf5e62475c947c530e564058e065eb7f6d16cc
-
Filesize
216KB
MD5b4417c27be73757080754c8fbdeb6787
SHA184d52bc37818e4cae59742544ff53911a69e9e31
SHA256f36443f7a258884ea8564f081b6f33e97670dd8ca2b2a1f96236ca754f6c1669
SHA512670399bf9f47f7609dfe8edc2131f3f240a7967003fdaec41eee6e9bd0f9a581ae6d001412fba6332fd67aab0e9e0e080d9d6bc117efa66580b06b304f71e1ff
-
Filesize
216KB
MD5ca19a62b9463e33b00b6b05481ad1160
SHA1dee61218dfca47c50c79845917041d7a8bf433bb
SHA25643db46b31269f2e079e79d7ffdcc37e36c50585d6c7b327478ff7190443b93ee
SHA512c8a066b00ee55fe6700d8e1a9d9c40308ab93f97615cf3ea72943e92f81e3a304e01535830a6ae6d56d4ce396591da33b6bbe9ceeb48eb42c0ecc1be20b48b74
-
Filesize
216KB
MD57d902443f3947feceb6bef44f3617481
SHA1e80e94110ccb0914d231a4eace2819d5d7fb9061
SHA256d0a9cfb7a929780e8c3334220d118ab088d1ce81431651c509321b5a31988c55
SHA51225472ab6557c2b680b96925e7aafbd4274c6e54f17af6bc6906cedaff1d7d9029a054a4cf340ec41293ac521610e2f4ff994076a46a6b473629c7437e68ad908
-
Filesize
216KB
MD598a8a685f7ea300534f7bd7ad3f8b5c8
SHA1482762d94a5ab53b703e5092da9fde74e025b960
SHA256fa9c6c05215919005dae980bfd0fcdbbfeae072e44e6bc2763af607c0d14d39b
SHA5124da4ef7b972924fbf32015c92f398af754f2ffb0850082626da4105e626bca13e8c0da425fe2c5203e7941c44621d04dce93dcb73172f7e42ec18f3398ea3d61