Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe
-
Size
197KB
-
MD5
9206b0dcae78734c7ccca68e6104babc
-
SHA1
8f913d7abcbbbfe748f50d9bdcb163cc9a92f68b
-
SHA256
c99dc5efdcdf7bf29b9f883e71ee392252fa7c431056c81a602ce4dd19d7f83a
-
SHA512
624b8c85733792e92915d459d2049df66798f10821032b05723e1567cfa85522b7dff81c92016c06d116a8c4ad89177a89d8a81dfce4cf4c6e539d03816b9738
-
SSDEEP
3072:jEGh0oDl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGJlEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F47A9B7C-635F-4405-AABE-164107479D05} {82E61106-D18F-49df-8969-87FA99719D9F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06BC41DC-274D-4853-A059-663FA4E3203C} {F47A9B7C-635F-4405-AABE-164107479D05}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C60E4C93-9D95-4221-945F-9D229C01E276} 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}\stubpath = "C:\\Windows\\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe" {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25FFFD7A-8211-441f-9BE4-E5614DC1891B}\stubpath = "C:\\Windows\\{25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe" {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82E61106-D18F-49df-8969-87FA99719D9F} {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{06BC41DC-274D-4853-A059-663FA4E3203C}\stubpath = "C:\\Windows\\{06BC41DC-274D-4853-A059-663FA4E3203C}.exe" {F47A9B7C-635F-4405-AABE-164107479D05}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A931C154-54BB-40c8-A850-236603F230E1}\stubpath = "C:\\Windows\\{A931C154-54BB-40c8-A850-236603F230E1}.exe" {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E}\stubpath = "C:\\Windows\\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe" {A931C154-54BB-40c8-A850-236603F230E1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC545188-DCCA-4602-9925-DC9A8EF300A5}\stubpath = "C:\\Windows\\{FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe" {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD}\stubpath = "C:\\Windows\\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe" {E742C79B-531E-459f-B02C-582F50B67AD2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E} {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E} {A931C154-54BB-40c8-A850-236603F230E1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25FFFD7A-8211-441f-9BE4-E5614DC1891B} {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82E61106-D18F-49df-8969-87FA99719D9F}\stubpath = "C:\\Windows\\{82E61106-D18F-49df-8969-87FA99719D9F}.exe" {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C60E4C93-9D95-4221-945F-9D229C01E276}\stubpath = "C:\\Windows\\{C60E4C93-9D95-4221-945F-9D229C01E276}.exe" 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E742C79B-531E-459f-B02C-582F50B67AD2}\stubpath = "C:\\Windows\\{E742C79B-531E-459f-B02C-582F50B67AD2}.exe" {C60E4C93-9D95-4221-945F-9D229C01E276}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD} {E742C79B-531E-459f-B02C-582F50B67AD2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F47A9B7C-635F-4405-AABE-164107479D05}\stubpath = "C:\\Windows\\{F47A9B7C-635F-4405-AABE-164107479D05}.exe" {82E61106-D18F-49df-8969-87FA99719D9F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E742C79B-531E-459f-B02C-582F50B67AD2} {C60E4C93-9D95-4221-945F-9D229C01E276}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A931C154-54BB-40c8-A850-236603F230E1} {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FC545188-DCCA-4602-9925-DC9A8EF300A5} {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe -
Deletes itself 1 IoCs
pid Process 2840 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 264 {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe 1296 {82E61106-D18F-49df-8969-87FA99719D9F}.exe 3004 {F47A9B7C-635F-4405-AABE-164107479D05}.exe 932 {06BC41DC-274D-4853-A059-663FA4E3203C}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F47A9B7C-635F-4405-AABE-164107479D05}.exe {82E61106-D18F-49df-8969-87FA99719D9F}.exe File created C:\Windows\{C60E4C93-9D95-4221-945F-9D229C01E276}.exe 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe File created C:\Windows\{E742C79B-531E-459f-B02C-582F50B67AD2}.exe {C60E4C93-9D95-4221-945F-9D229C01E276}.exe File created C:\Windows\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe {E742C79B-531E-459f-B02C-582F50B67AD2}.exe File created C:\Windows\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe File created C:\Windows\{FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe File created C:\Windows\{82E61106-D18F-49df-8969-87FA99719D9F}.exe {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe File created C:\Windows\{A931C154-54BB-40c8-A850-236603F230E1}.exe {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe File created C:\Windows\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe {A931C154-54BB-40c8-A850-236603F230E1}.exe File created C:\Windows\{25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe File created C:\Windows\{06BC41DC-274D-4853-A059-663FA4E3203C}.exe {F47A9B7C-635F-4405-AABE-164107479D05}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A931C154-54BB-40c8-A850-236603F230E1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {82E61106-D18F-49df-8969-87FA99719D9F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06BC41DC-274D-4853-A059-663FA4E3203C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F47A9B7C-635F-4405-AABE-164107479D05}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C60E4C93-9D95-4221-945F-9D229C01E276}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E742C79B-531E-459f-B02C-582F50B67AD2}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe Token: SeIncBasePriorityPrivilege 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe Token: SeIncBasePriorityPrivilege 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe Token: SeIncBasePriorityPrivilege 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe Token: SeIncBasePriorityPrivilege 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe Token: SeIncBasePriorityPrivilege 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe Token: SeIncBasePriorityPrivilege 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe Token: SeIncBasePriorityPrivilege 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe Token: SeIncBasePriorityPrivilege 264 {FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe Token: SeIncBasePriorityPrivilege 1296 {82E61106-D18F-49df-8969-87FA99719D9F}.exe Token: SeIncBasePriorityPrivilege 3004 {F47A9B7C-635F-4405-AABE-164107479D05}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2704 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 30 PID 2692 wrote to memory of 2704 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 30 PID 2692 wrote to memory of 2704 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 30 PID 2692 wrote to memory of 2704 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 30 PID 2692 wrote to memory of 2840 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 31 PID 2692 wrote to memory of 2840 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 31 PID 2692 wrote to memory of 2840 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 31 PID 2692 wrote to memory of 2840 2692 2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe 31 PID 2704 wrote to memory of 2444 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 32 PID 2704 wrote to memory of 2444 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 32 PID 2704 wrote to memory of 2444 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 32 PID 2704 wrote to memory of 2444 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 32 PID 2704 wrote to memory of 1528 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 33 PID 2704 wrote to memory of 1528 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 33 PID 2704 wrote to memory of 1528 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 33 PID 2704 wrote to memory of 1528 2704 {C60E4C93-9D95-4221-945F-9D229C01E276}.exe 33 PID 2444 wrote to memory of 2636 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 34 PID 2444 wrote to memory of 2636 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 34 PID 2444 wrote to memory of 2636 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 34 PID 2444 wrote to memory of 2636 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 34 PID 2444 wrote to memory of 2044 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 35 PID 2444 wrote to memory of 2044 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 35 PID 2444 wrote to memory of 2044 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 35 PID 2444 wrote to memory of 2044 2444 {E742C79B-531E-459f-B02C-582F50B67AD2}.exe 35 PID 2636 wrote to memory of 2372 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 36 PID 2636 wrote to memory of 2372 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 36 PID 2636 wrote to memory of 2372 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 36 PID 2636 wrote to memory of 2372 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 36 PID 2636 wrote to memory of 1252 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 37 PID 2636 wrote to memory of 1252 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 37 PID 2636 wrote to memory of 1252 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 37 PID 2636 wrote to memory of 1252 2636 {26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe 37 PID 2372 wrote to memory of 936 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 38 PID 2372 wrote to memory of 936 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 38 PID 2372 wrote to memory of 936 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 38 PID 2372 wrote to memory of 936 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 38 PID 2372 wrote to memory of 1512 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 39 PID 2372 wrote to memory of 1512 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 39 PID 2372 wrote to memory of 1512 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 39 PID 2372 wrote to memory of 1512 2372 {10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe 39 PID 936 wrote to memory of 2096 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 41 PID 936 wrote to memory of 2096 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 41 PID 936 wrote to memory of 2096 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 41 PID 936 wrote to memory of 2096 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 41 PID 936 wrote to memory of 1624 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 42 PID 936 wrote to memory of 1624 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 42 PID 936 wrote to memory of 1624 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 42 PID 936 wrote to memory of 1624 936 {A931C154-54BB-40c8-A850-236603F230E1}.exe 42 PID 2096 wrote to memory of 2380 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 43 PID 2096 wrote to memory of 2380 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 43 PID 2096 wrote to memory of 2380 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 43 PID 2096 wrote to memory of 2380 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 43 PID 2096 wrote to memory of 832 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 44 PID 2096 wrote to memory of 832 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 44 PID 2096 wrote to memory of 832 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 44 PID 2096 wrote to memory of 832 2096 {29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe 44 PID 2380 wrote to memory of 264 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 45 PID 2380 wrote to memory of 264 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 45 PID 2380 wrote to memory of 264 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 45 PID 2380 wrote to memory of 264 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 45 PID 2380 wrote to memory of 1784 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 46 PID 2380 wrote to memory of 1784 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 46 PID 2380 wrote to memory of 1784 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 46 PID 2380 wrote to memory of 1784 2380 {25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_9206b0dcae78734c7ccca68e6104babc_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{C60E4C93-9D95-4221-945F-9D229C01E276}.exeC:\Windows\{C60E4C93-9D95-4221-945F-9D229C01E276}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\{E742C79B-531E-459f-B02C-582F50B67AD2}.exeC:\Windows\{E742C79B-531E-459f-B02C-582F50B67AD2}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exeC:\Windows\{26A2CE61-1496-468a-91F7-5CA10CDCE2BD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exeC:\Windows\{10A93BC5-FE08-409a-9DD7-E3FCC0E22A2E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\{A931C154-54BB-40c8-A850-236603F230E1}.exeC:\Windows\{A931C154-54BB-40c8-A850-236603F230E1}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exeC:\Windows\{29076C8F-3DB7-45a7-A3FD-366D1FD5361E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\{25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exeC:\Windows\{25FFFD7A-8211-441f-9BE4-E5614DC1891B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\{FC545188-DCCA-4602-9925-DC9A8EF300A5}.exeC:\Windows\{FC545188-DCCA-4602-9925-DC9A8EF300A5}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\{82E61106-D18F-49df-8969-87FA99719D9F}.exeC:\Windows\{82E61106-D18F-49df-8969-87FA99719D9F}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Windows\{F47A9B7C-635F-4405-AABE-164107479D05}.exeC:\Windows\{F47A9B7C-635F-4405-AABE-164107479D05}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\{06BC41DC-274D-4853-A059-663FA4E3203C}.exeC:\Windows\{06BC41DC-274D-4853-A059-663FA4E3203C}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F47A9~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{82E61~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC545~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{25FFF~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{29076~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A931C~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{10A93~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A2C~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E742C~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C60E4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD56fe7da4255be9b3fdb62f0c6942f73eb
SHA157fe49a75cbb5c7f84a9e2b4e9d24825ad061129
SHA25696a26962f23935be7d6b3e556f63c34d1eceb2b55a1293b30e18dffe4cc599df
SHA512b8db4280c17db556c81d727a19f6aacab39ba334cf859d4e5f80bb7613eded0a4773b08a5a253086674423c11136da706b7e253ca7ca0e693aa337802b4f1e99
-
Filesize
197KB
MD597a3c79b3100812bb3415ddf7cb6f793
SHA1abbdbc46806fb207527edb66b2a991fec1b49b00
SHA2564abd72117c4eb4d8f0aac0ff46163cecf63a1c379b25b784f7c2e1d3cd4f03ed
SHA512cb67632762a2ba6d75dbdff36066cc59413189bf2f1666d999fa2d65f1c1595201bf98b9b3b25883df6dc7e73b34d7f4dca7dcad9009fa3fcefa53aafab50ee2
-
Filesize
197KB
MD5d26a96efdde12a767942a0b78e0bfc09
SHA1d8e2c839c5ab3fcdc8b28ea88f9fbf2db2606870
SHA2562ab7fe73ba776a7cdef09147c5ab35c0097be7e5be587cb17042d2fa4dd13c30
SHA512bc33214cb3c831bd2862d1674ca1ab16e1c86f5a3b6eea5caa1862d8e7895ba527006856915aa0b001cec4dc0954dce9202ee98218eb343099d0ed8587225877
-
Filesize
197KB
MD52c8d9b86b5c9f457ca1d44e02d387ca0
SHA13f8cd816167432127127ece820b29442d3b7f270
SHA256c7ba95cca73535575a452a536a1ce32f7b7f472ea99fed1c46d872c708dcfe50
SHA51251d2f4ccce4f1c1d9dca0053117e1f1b0604c5a5a78339dc18bea1ce2f51e94f25a0f39ddcb4457ff394f03e2680739e0000e1c1c64582d386dc6631621516a3
-
Filesize
197KB
MD5e6975dff8574d6eecf633060810e315a
SHA1dbdbe339ca4119bdfb11b35d844a1c4486a76f53
SHA2569358f936476fcffbdbd8b20205ee2097da3dc2a8ea009180276538a81ba864dc
SHA5121cc623b076f6cdc478653e6a04e6f346e359f78e2d2a2187478f8cbc81c952aea3b036db9a219b2c77b636ba12bc81ce2fcfa47dabf72f81a574a1c7192f4c9a
-
Filesize
197KB
MD568309886cf69d9aae79a35ad08d8ad59
SHA1cca5ef4bd936aa01d385c096ef5aeac68f734540
SHA256de3be6658b21e0d71019713912f1581c83ea86580c3909aabd90ce52c45a84a2
SHA512a4185e1718f389b283ac2d03d92440804ba3c4aeb8027b545f8c26e25f029911e9094fc68287f743ab6b4389fc2d759f265e167c4ca6d77b557265df1884b146
-
Filesize
197KB
MD5a62de11492cfb9b8650833f4d99f59a9
SHA1505a924c2d72d5b965c1639ebeef4d1a2ab32c27
SHA256cd7152a111f8f2ac451eb074eb19e800e5d48f4921da744d35ddbe16471f7d29
SHA5127a937ba3a9072af68f052a5d076f7e9603f1bdaa7bc81aad89b81f2326ef02b47b4b27e1d9b0e43394b53036fe1cee9fcb5e8aa69ec1ea74e007636e0652628e
-
Filesize
197KB
MD53c0612c4cb85fe21a72f23557d0c9036
SHA12c0d82fcf6060a97d04ddc5f2f9b03c3575122bd
SHA256f3a2e7cf64f3b7ed72a65809629071836662fc579cda634ca03e859940188543
SHA5126a093c7c4f81d81738451699d5ec1cd2ca1e15344c31c3182309359c38d1046ecdccab14f48610eb9671a9ebbc19d8c38e5d0bd997af37e87c469c766f403fa3
-
Filesize
197KB
MD51660159d6a5f139279e7a870877156c1
SHA1705c90793d6f6450cf687ec4451f08b60a78ac2f
SHA2566ea6cb9bdc2dad2ebab1c3a556b3981a70df9fb89a32d096125b69e32b706885
SHA5122490962f8b4d0cc623eef40eb2b9fc7a626496202200a706bf9b68a1ce0c7982de0d53a63cf76bcc40be64f5756a0c63a57af856c5094a8750d340dfe25167cf
-
Filesize
197KB
MD5498e9b09c49c37770269bc7b6d4d2a48
SHA19e52fc48050d88ad05ec2f0b5df1d0be993f8bf0
SHA256b084ddb081adbcddc7cef399e74af510a51adcb85d93384da2a79e5916f74219
SHA512654547acc4f96bc3d7202ad26b0fd0c8f1dd9bcf8999eeac8995fc146f8c867900879dce8eec517e1e8b5ce5a2a1deadfc6dfe9e31ef88ecf86000679fa9937e
-
Filesize
197KB
MD55d09e41027ffce2542bd320253cbc391
SHA15c1e55225801a68cfc0a94b7a0dbfdad5e566813
SHA2566e75b3297c32d339f4e93858c13befda029c0d9a693b18cca60a26ca8cb468cd
SHA51209b67adffb331f3d53334e0a2f51e2cfbcec86c985596db487f7768388b9b91557c14f0638b4db8e7b52e6d3abefcf63b99c2c5e6a9ce4b80963f66c03b94855