Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe
-
Size
168KB
-
MD5
7f8431dd7750cb5a01b73901b0cc6991
-
SHA1
0e211c2a4f2e0c152f6bbdf651cf26c71f4bcfdf
-
SHA256
fc29a70bf74832242e2ab3d42fe59e4fd34c361f6c5041a950122d33c37cf6ff
-
SHA512
177e5f7fdf629c16e0b3e3b1d07e6657745de4e61cfeb426466c3e6a9b94d25a7db305c94439367b3c4f09eea8a51e46f791035c0ba6843b40c2d21df33af212
-
SSDEEP
1536:1EGh0oplq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oplqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622} 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{404E4D67-D20F-4e51-8DF1-4583D57B2C89} {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C28E6B9-0C7C-4af2-846E-F351379B5825}\stubpath = "C:\\Windows\\{6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe" {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D95E73C-0110-4bc2-BCB3-02C18821D125} {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{259569A4-F7F7-4e33-9894-7EDC1880AA39} {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D} {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}\stubpath = "C:\\Windows\\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe" {809516E9-B291-4899-A1AD-9A1C7679961D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{404E4D67-D20F-4e51-8DF1-4583D57B2C89}\stubpath = "C:\\Windows\\{404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe" {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D95E73C-0110-4bc2-BCB3-02C18821D125}\stubpath = "C:\\Windows\\{0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe" {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DC86C68-CB17-439d-B1FF-02605B97F7A3}\stubpath = "C:\\Windows\\{9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe" {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}\stubpath = "C:\\Windows\\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe" {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{809516E9-B291-4899-A1AD-9A1C7679961D} {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{809516E9-B291-4899-A1AD-9A1C7679961D}\stubpath = "C:\\Windows\\{809516E9-B291-4899-A1AD-9A1C7679961D}.exe" {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}\stubpath = "C:\\Windows\\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe" 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{259569A4-F7F7-4e33-9894-7EDC1880AA39}\stubpath = "C:\\Windows\\{259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe" {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9DC86C68-CB17-439d-B1FF-02605B97F7A3} {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF9458C6-4931-4cd2-A4BE-19D17D849713}\stubpath = "C:\\Windows\\{EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe" {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D}\stubpath = "C:\\Windows\\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exe" {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C28E6B9-0C7C-4af2-846E-F351379B5825} {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF9458C6-4931-4cd2-A4BE-19D17D849713} {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A} {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD} {809516E9-B291-4899-A1AD-9A1C7679961D}.exe -
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 1608 {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe 2080 {809516E9-B291-4899-A1AD-9A1C7679961D}.exe 2560 {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe 420 {844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe File created C:\Windows\{0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe File created C:\Windows\{9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe File created C:\Windows\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe File created C:\Windows\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe {809516E9-B291-4899-A1AD-9A1C7679961D}.exe File created C:\Windows\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exe {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe File created C:\Windows\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe File created C:\Windows\{404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe File created C:\Windows\{809516E9-B291-4899-A1AD-9A1C7679961D}.exe {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe File created C:\Windows\{259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe File created C:\Windows\{EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {809516E9-B291-4899-A1AD-9A1C7679961D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe Token: SeIncBasePriorityPrivilege 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe Token: SeIncBasePriorityPrivilege 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe Token: SeIncBasePriorityPrivilege 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe Token: SeIncBasePriorityPrivilege 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe Token: SeIncBasePriorityPrivilege 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe Token: SeIncBasePriorityPrivilege 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe Token: SeIncBasePriorityPrivilege 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe Token: SeIncBasePriorityPrivilege 1608 {1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe Token: SeIncBasePriorityPrivilege 2080 {809516E9-B291-4899-A1AD-9A1C7679961D}.exe Token: SeIncBasePriorityPrivilege 2560 {146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 2500 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 31 PID 1296 wrote to memory of 2500 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 31 PID 1296 wrote to memory of 2500 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 31 PID 1296 wrote to memory of 2500 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 31 PID 1296 wrote to memory of 2892 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 32 PID 1296 wrote to memory of 2892 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 32 PID 1296 wrote to memory of 2892 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 32 PID 1296 wrote to memory of 2892 1296 2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe 32 PID 2500 wrote to memory of 2820 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 33 PID 2500 wrote to memory of 2820 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 33 PID 2500 wrote to memory of 2820 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 33 PID 2500 wrote to memory of 2820 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 33 PID 2500 wrote to memory of 2760 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 34 PID 2500 wrote to memory of 2760 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 34 PID 2500 wrote to memory of 2760 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 34 PID 2500 wrote to memory of 2760 2500 {75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe 34 PID 2820 wrote to memory of 2884 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 35 PID 2820 wrote to memory of 2884 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 35 PID 2820 wrote to memory of 2884 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 35 PID 2820 wrote to memory of 2884 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 35 PID 2820 wrote to memory of 2852 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 36 PID 2820 wrote to memory of 2852 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 36 PID 2820 wrote to memory of 2852 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 36 PID 2820 wrote to memory of 2852 2820 {404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe 36 PID 2884 wrote to memory of 2608 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 37 PID 2884 wrote to memory of 2608 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 37 PID 2884 wrote to memory of 2608 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 37 PID 2884 wrote to memory of 2608 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 37 PID 2884 wrote to memory of 2640 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 38 PID 2884 wrote to memory of 2640 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 38 PID 2884 wrote to memory of 2640 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 38 PID 2884 wrote to memory of 2640 2884 {6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe 38 PID 2608 wrote to memory of 2300 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 39 PID 2608 wrote to memory of 2300 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 39 PID 2608 wrote to memory of 2300 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 39 PID 2608 wrote to memory of 2300 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 39 PID 2608 wrote to memory of 2924 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 40 PID 2608 wrote to memory of 2924 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 40 PID 2608 wrote to memory of 2924 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 40 PID 2608 wrote to memory of 2924 2608 {0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe 40 PID 2300 wrote to memory of 2240 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 41 PID 2300 wrote to memory of 2240 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 41 PID 2300 wrote to memory of 2240 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 41 PID 2300 wrote to memory of 2240 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 41 PID 2300 wrote to memory of 588 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 42 PID 2300 wrote to memory of 588 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 42 PID 2300 wrote to memory of 588 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 42 PID 2300 wrote to memory of 588 2300 {259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe 42 PID 2240 wrote to memory of 324 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 43 PID 2240 wrote to memory of 324 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 43 PID 2240 wrote to memory of 324 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 43 PID 2240 wrote to memory of 324 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 43 PID 2240 wrote to memory of 592 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 44 PID 2240 wrote to memory of 592 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 44 PID 2240 wrote to memory of 592 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 44 PID 2240 wrote to memory of 592 2240 {9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe 44 PID 324 wrote to memory of 1608 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 45 PID 324 wrote to memory of 1608 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 45 PID 324 wrote to memory of 1608 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 45 PID 324 wrote to memory of 1608 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 45 PID 324 wrote to memory of 1732 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 46 PID 324 wrote to memory of 1732 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 46 PID 324 wrote to memory of 1732 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 46 PID 324 wrote to memory of 1732 324 {EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_7f8431dd7750cb5a01b73901b0cc6991_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exeC:\Windows\{75C2F2DF-C8F5-49b4-B5D7-CC91A85C1622}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\{404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exeC:\Windows\{404E4D67-D20F-4e51-8DF1-4583D57B2C89}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\{6C28E6B9-0C7C-4af2-846E-F351379B5825}.exeC:\Windows\{6C28E6B9-0C7C-4af2-846E-F351379B5825}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{0D95E73C-0110-4bc2-BCB3-02C18821D125}.exeC:\Windows\{0D95E73C-0110-4bc2-BCB3-02C18821D125}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\{259569A4-F7F7-4e33-9894-7EDC1880AA39}.exeC:\Windows\{259569A4-F7F7-4e33-9894-7EDC1880AA39}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exeC:\Windows\{9DC86C68-CB17-439d-B1FF-02605B97F7A3}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\{EF9458C6-4931-4cd2-A4BE-19D17D849713}.exeC:\Windows\{EF9458C6-4931-4cd2-A4BE-19D17D849713}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exeC:\Windows\{1840F6FF-1EFF-4d09-90AD-5DE9B815E11A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\{809516E9-B291-4899-A1AD-9A1C7679961D}.exeC:\Windows\{809516E9-B291-4899-A1AD-9A1C7679961D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exeC:\Windows\{146227F9-3DB5-4fc7-8FE4-F6595FDDBBDD}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exeC:\Windows\{844DFF05-0AA2-4a25-B07D-3AE3A17F499D}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14622~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{80951~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1840F~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF945~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DC86~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{25956~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D95E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C28E~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{404E4~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{75C2F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD589c8a7afacfb18c3e213bf82b3a99c05
SHA12544171fa19483a8883c2799f3a7dc7932738b6c
SHA256b8e6c73c0737c3c22bcd7a84c9665153dc658c677e795e3fde101136629ea016
SHA512844dfe79c02eb78a23a184ed3d17cc27566fb9c4a0574f221e9bc3a471e15045d8848cc32742a1bc3e75bb8a22c7dee7aaa88d697ea001bad322c88fe577726f
-
Filesize
168KB
MD59627ce631500e198a50789d5125c18a8
SHA196bab6b124e0426af614d0c79d26eeed7dcb3ded
SHA25699f0feb2a47830d54b706d11d630183bc7ab057cd37be47f61fb73ee6a4fafa0
SHA5129ae40e4369640c01c05e57ee30c4403ae37b540e479ae3016776e90349c915475eb60c3d75dbed3f4683f07de5aa62c1c57b5e2f3fd4b748922b6c8f13e4e42b
-
Filesize
168KB
MD561137bcf7eb6b163c769ec30a5da51af
SHA1c5f47f652f096033501a8ce65103bc4ffa7f421f
SHA2566ddfb091005bfc399f4bae1be9ce70e2991aaa548c04ad03d75382267effc461
SHA5122debb0c42b469f91abb8f108a170164f77907b6dbe2411a5cbc3d09725d2db2012fbb50bc20c28ab749fc602355caa63e942ebb1baa8fa1d8186bbb7433a3bb5
-
Filesize
168KB
MD54d4c839b3689ac4e0cabcadb94145dbb
SHA1cf7e41ed7d1936af9f49898d5ea01f273f57a97f
SHA256a1c0862a11c8713885e8f4f6d0a228758107aa2dfb6e1f84c3b87d82f710b63e
SHA51200a4aff5d72c15bab6f50fc3a47c432b012586c7220f924066be860c48248960476f12528e8f9129cd340f46824e6569dc739d8c5c71fa8a7e808ea3f24adf07
-
Filesize
168KB
MD5b9aa986def7c94ce93db2f195b3fb213
SHA12e85728007e32eaa490e607d9893f4e711cf843b
SHA2561f41aee044ab665ca713614137f0aa0d2099ce6fa90a0cf13a59641072974ca3
SHA5126759f5551b26978c5747ba94ea5222ac3651995fd606d86728db4813117bf123db1f7000fc50539a7bbe50fbfd15b4a9e01381085ca290363a7d4ac43cd48076
-
Filesize
168KB
MD57c63af7ef0e7ffeeef9be9cdacbb851e
SHA1337f9c4051b885ef57c1111a86beea7a81f22809
SHA25674269c0442ecf3e4e4811dae25b718285e259b3ff90d77d362d62864a667b919
SHA5126a988edc0117ab915fc750afec6c48d82c54686daccd5d45b57506043c82b4cb5cceefbe7057a4c576eee8b72fe62a60167bfc6fc78c7145c1f8870f8f37ce9e
-
Filesize
168KB
MD594b7bbbd78cd8e7c3726aeeca9ec6f38
SHA171dcf5bba89b629e53c6c24c7e9bf0dc9a01134d
SHA2568497243901c8c53debabe4a1420e0537fc7e1ab3a428a62c19aab3d16d7bf3ee
SHA51267353d55dcfadeb2da3e268fd5de2289fc6cae6ed354566e20a4cad34f4729a9907e8faa6b64f2ce964c5244d62af961c36ba137480eebaa92624e1dd53ca3ea
-
Filesize
168KB
MD578d4f47271f6829ca3e310ba7068eaba
SHA17e69857fa8eeca9910142abc6968ce1cb785ac4b
SHA256a7e7033c5f0c3265390ad0f92d791bf4d040ed7069c745bae076602ea582c8c8
SHA512f935171ada781c0fc73fb60688eb6c1404d5536b3e9a152525051ec4e57658a3c79866de7d5ffbeebbb8c1133487637cf1afd2349307f99b9381964c487eb12f
-
Filesize
168KB
MD584ec6b749a29708c79d38ba3a06530f6
SHA1bff182930497191700f1ba5553ef2b0ad94f10a7
SHA2569b7b5c3ecf1eebfb4e17654bf1d365d800c52379775c860beca1e4cf05cdfb46
SHA512644a91bd5db189ce642c2f690d4fa8f8d31f31453ffb18c905f5bd4ea81fc810cdee6bed65f83be49dd9724d5f1221a97bb15da770eea689adca470c65972341
-
Filesize
168KB
MD5399e38d5d1bc6b15a460dacf8cf03a4a
SHA162c080b0ec42d6a6dace4b16ffc1b188787198e1
SHA25638ff578ec262b80127c95aa0698cc37e252708a90b45b50a6e793c1e2cc13f1b
SHA512978e9e85672dd8fcece584d3444a12f7f3caa4682d02e8f2a3d1643e899e612606612cf51b0d59b31f6a57e9f026e395be9213971b2404c2e7fc60a6fab09802
-
Filesize
168KB
MD544c615efbd148ca521eaf88b3ccadc1d
SHA17b94e0acec0b19d3a96c134df33fd55dfe0f6eac
SHA256b90e66bdb6ec7e2ed87e71481d0dcceaabb4850e6ca6772ee4db106887c13816
SHA51278ce53255e5710935526c08eeeaeb1090d0cd08f7909f5832f813e5582fee604a89a69bf13ff9ec9e286bd3dc8f13e2a27eb3360347f8351e7ef2b54ee0f659b