Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe
-
Size
168KB
-
MD5
a80dabf659d32f1291733d0bfd9a8787
-
SHA1
ae8364364fb2873a26641bd8a1be4c776a221c8e
-
SHA256
72a2ca06af4ddbbcfe583c635a5ff039e006c6e5d658cff114226f599eed8c50
-
SHA512
612157d2df64df07bc9cf4b9b9d68be5db76b0e01680ddf870235887bde607c7e7c15feb19232a4c3d696460f01e6bff86320b0da324debbe70c6582763b3dd8
-
SSDEEP
1536:1EGh0oSlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oSlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F} {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{951D6418-CBD0-4f41-8129-D8A84FB1E24A} {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C395026-DF68-49f4-8EE4-36005E0D5924} {16938679-306F-4298-BC94-8082C2B5CED3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB} {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB}\stubpath = "C:\\Windows\\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe" {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9F07D45-5744-4940-818A-0C2BDB9C9F23} {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6629C955-5D9C-433f-AF66-E77DD73A4884} {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6629C955-5D9C-433f-AF66-E77DD73A4884}\stubpath = "C:\\Windows\\{6629C955-5D9C-433f-AF66-E77DD73A4884}.exe" {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16938679-306F-4298-BC94-8082C2B5CED3} 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D9F07D45-5744-4940-818A-0C2BDB9C9F23}\stubpath = "C:\\Windows\\{D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe" {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0} {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}\stubpath = "C:\\Windows\\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe" {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5C395026-DF68-49f4-8EE4-36005E0D5924}\stubpath = "C:\\Windows\\{5C395026-DF68-49f4-8EE4-36005E0D5924}.exe" {16938679-306F-4298-BC94-8082C2B5CED3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4} {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}\stubpath = "C:\\Windows\\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe" {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{951D6418-CBD0-4f41-8129-D8A84FB1E24A}\stubpath = "C:\\Windows\\{951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exe" {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF} {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF}\stubpath = "C:\\Windows\\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe" {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89} {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}\stubpath = "C:\\Windows\\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe" {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16938679-306F-4298-BC94-8082C2B5CED3}\stubpath = "C:\\Windows\\{16938679-306F-4298-BC94-8082C2B5CED3}.exe" 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}\stubpath = "C:\\Windows\\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe" {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0C9721A-4F78-49b1-A9AD-808584D07DF3} {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0C9721A-4F78-49b1-A9AD-808584D07DF3}\stubpath = "C:\\Windows\\{E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe" {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe -
Executes dropped EXE 12 IoCs
pid Process 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe 1516 {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe 3572 {951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe File created C:\Windows\{D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe File created C:\Windows\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe File created C:\Windows\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe File created C:\Windows\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe File created C:\Windows\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe File created C:\Windows\{16938679-306F-4298-BC94-8082C2B5CED3}.exe 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe File created C:\Windows\{5C395026-DF68-49f4-8EE4-36005E0D5924}.exe {16938679-306F-4298-BC94-8082C2B5CED3}.exe File created C:\Windows\{6629C955-5D9C-433f-AF66-E77DD73A4884}.exe {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe File created C:\Windows\{951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exe {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe File created C:\Windows\{E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe File created C:\Windows\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16938679-306F-4298-BC94-8082C2B5CED3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe Token: SeIncBasePriorityPrivilege 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe Token: SeIncBasePriorityPrivilege 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe Token: SeIncBasePriorityPrivilege 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe Token: SeIncBasePriorityPrivilege 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe Token: SeIncBasePriorityPrivilege 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe Token: SeIncBasePriorityPrivilege 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe Token: SeIncBasePriorityPrivilege 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe Token: SeIncBasePriorityPrivilege 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe Token: SeIncBasePriorityPrivilege 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe Token: SeIncBasePriorityPrivilege 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe Token: SeIncBasePriorityPrivilege 1516 {6629C955-5D9C-433f-AF66-E77DD73A4884}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4084 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 89 PID 5032 wrote to memory of 4084 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 89 PID 5032 wrote to memory of 4084 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 89 PID 5032 wrote to memory of 2248 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 90 PID 5032 wrote to memory of 2248 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 90 PID 5032 wrote to memory of 2248 5032 2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe 90 PID 4084 wrote to memory of 1696 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 91 PID 4084 wrote to memory of 1696 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 91 PID 4084 wrote to memory of 1696 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 91 PID 4084 wrote to memory of 1544 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 92 PID 4084 wrote to memory of 1544 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 92 PID 4084 wrote to memory of 1544 4084 {16938679-306F-4298-BC94-8082C2B5CED3}.exe 92 PID 1696 wrote to memory of 3472 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 95 PID 1696 wrote to memory of 3472 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 95 PID 1696 wrote to memory of 3472 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 95 PID 1696 wrote to memory of 4728 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 96 PID 1696 wrote to memory of 4728 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 96 PID 1696 wrote to memory of 4728 1696 {5C395026-DF68-49f4-8EE4-36005E0D5924}.exe 96 PID 3472 wrote to memory of 2536 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 97 PID 3472 wrote to memory of 2536 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 97 PID 3472 wrote to memory of 2536 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 97 PID 3472 wrote to memory of 3184 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 98 PID 3472 wrote to memory of 3184 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 98 PID 3472 wrote to memory of 3184 3472 {F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe 98 PID 2536 wrote to memory of 1380 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 99 PID 2536 wrote to memory of 1380 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 99 PID 2536 wrote to memory of 1380 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 99 PID 2536 wrote to memory of 1908 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 100 PID 2536 wrote to memory of 1908 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 100 PID 2536 wrote to memory of 1908 2536 {D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe 100 PID 1380 wrote to memory of 4388 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 101 PID 1380 wrote to memory of 4388 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 101 PID 1380 wrote to memory of 4388 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 101 PID 1380 wrote to memory of 4152 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 102 PID 1380 wrote to memory of 4152 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 102 PID 1380 wrote to memory of 4152 1380 {D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe 102 PID 4388 wrote to memory of 3880 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 103 PID 4388 wrote to memory of 3880 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 103 PID 4388 wrote to memory of 3880 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 103 PID 4388 wrote to memory of 2116 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 104 PID 4388 wrote to memory of 2116 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 104 PID 4388 wrote to memory of 2116 4388 {CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe 104 PID 3880 wrote to memory of 4208 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 105 PID 3880 wrote to memory of 4208 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 105 PID 3880 wrote to memory of 4208 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 105 PID 3880 wrote to memory of 1068 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 106 PID 3880 wrote to memory of 1068 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 106 PID 3880 wrote to memory of 1068 3880 {E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe 106 PID 4208 wrote to memory of 3316 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 107 PID 4208 wrote to memory of 3316 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 107 PID 4208 wrote to memory of 3316 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 107 PID 4208 wrote to memory of 4816 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 108 PID 4208 wrote to memory of 4816 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 108 PID 4208 wrote to memory of 4816 4208 {48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe 108 PID 3316 wrote to memory of 2336 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 109 PID 3316 wrote to memory of 2336 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 109 PID 3316 wrote to memory of 2336 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 109 PID 3316 wrote to memory of 3080 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 110 PID 3316 wrote to memory of 3080 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 110 PID 3316 wrote to memory of 3080 3316 {BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe 110 PID 2336 wrote to memory of 1516 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe 111 PID 2336 wrote to memory of 1516 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe 111 PID 2336 wrote to memory of 1516 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe 111 PID 2336 wrote to memory of 4924 2336 {8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_a80dabf659d32f1291733d0bfd9a8787_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\{16938679-306F-4298-BC94-8082C2B5CED3}.exeC:\Windows\{16938679-306F-4298-BC94-8082C2B5CED3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\{5C395026-DF68-49f4-8EE4-36005E0D5924}.exeC:\Windows\{5C395026-DF68-49f4-8EE4-36005E0D5924}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exeC:\Windows\{F4DCE912-41F7-44ed-8BAC-73E8723C71EB}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\{D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exeC:\Windows\{D9F07D45-5744-4940-818A-0C2BDB9C9F23}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exeC:\Windows\{D2B62AB6-22D5-4913-8A1E-2E6BC6C0BEC0}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exeC:\Windows\{CF16FE49-E93F-41b1-A9EF-EB12F7AE8DA4}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\{E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exeC:\Windows\{E0C9721A-4F78-49b1-A9AD-808584D07DF3}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exeC:\Windows\{48915553-5C57-4aa9-B4B8-ACF5F0A262BF}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exeC:\Windows\{BB0F813F-7C7D-4699-812D-EFBAEDD0FA89}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exeC:\Windows\{8C4FEA6C-41D1-4259-A305-B8DD5ED1662F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{6629C955-5D9C-433f-AF66-E77DD73A4884}.exeC:\Windows\{6629C955-5D9C-433f-AF66-E77DD73A4884}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\{951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exeC:\Windows\{951D6418-CBD0-4f41-8129-D8A84FB1E24A}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6629C~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C4FE~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BB0F8~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{48915~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0C97~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF16F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2B62~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9F07~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4DCE~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5C395~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16938~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD51eca6bed5f445c2943d1efcf2ab5c9ae
SHA1a0f874cd24bc44ec212a4d9715a9eb4de683c9d6
SHA25617cd0b4877560a4f6d52c94234a8a0c08eac814fb6f33b8fed596509cc36d3ac
SHA5122f6a82f6e5675ef3c429b85f13fdbce98f962dc7930fd5b813fa60aa5fd5af9954dcc59e79dbe2a3c37960b273ff8e64622ca917192affcf173502e251117466
-
Filesize
168KB
MD5c768ad00ab8f04ca6e98ca7e3d20d19e
SHA11b89f89b47a06c7dfc45e5b2ea1452355cc21ba6
SHA256ed6b5f92f2ea8932cbf4f0ed656802130f09684d60afe0bad18cb4ba90ffd555
SHA512c179c4f3ddabe10e0ea9daf72b742f7fa1a68a970df6f248b7baff846fefcf97f8da6722232628874f3bc68b12ee8612a7f4853433f3eb5e01b0f76f9914184e
-
Filesize
168KB
MD5678cdecbe5813169349f29377878e0ba
SHA1e82e563e7e5857727eec60dd08afd58d52041ffd
SHA2562cffd49df6921cefcb9fe2d010533b4c47003b7b927d4b7b8de35790041805d5
SHA5126b64aaff48fa0da181b82ea65e728cdeb370ef338abf6ab8164c959fab630d32def6f77bbbf338e1dd1d9457033b633b6f9ae0e4a9a3865ef5e2f8a0418c36b5
-
Filesize
168KB
MD56848e81b3916a03a4376cbc9f5a7e0c4
SHA1cd3decd5099bf38b0299d2f9e251a0d6640dbdb0
SHA25684ffc119165a30c7c76bf447929eb81284890212840116dcfde6a13bfbe84904
SHA512ba99642476027fd274d586c0616896d0d60a3970e9e2e9a92eb5b061d714d0624de1e70ab796f160ccbebe7cc1e11fb262a629103492f2df77aac823c49a2567
-
Filesize
168KB
MD546a5e91272e4bc6144883af9eb1535f2
SHA1931b66a6ca1177db23a70bbfa9a2fff69ea910b3
SHA2561e4c201e4172d79d8b10e3c1387a76f2cb01668495ff4b55b9a227a41fe8f3f2
SHA512942c763223c6b3fd2fb80f69a5e8e65a84f29721d2369f9b618bf8a26d7343de69f25945054fca6acc24f45383b10c86af8f4fc88ee26f495273d92c705d93d9
-
Filesize
168KB
MD560cc2db1bd0a846d39efef0d8ab97359
SHA1965f30a627877de6651e3a759ce92b789fd72cc1
SHA25667c9d6b2473fe6b7303e3c50fcef7f15b60cc2a52a53ac480bed0488e52c7caf
SHA51232376b85d1284e373552a30460adcd0dd8ddd87c843f5c6cd9d3dec03756db21aa167759fcdb0c812d23d08a637e9601a85e20bcdbf5d39069d3724752cf8a6d
-
Filesize
168KB
MD5ae6edc0b97a83c88905ee96d92c8962f
SHA1d19246de18c5a4904ddcfae2b376bfe274b483cd
SHA256baa3f46fbc4be5c685b5078d5f1db0ae706be946da5ec66ade18dfa983e5543f
SHA5128939a045757b5b15aacebe7653890773dad62a1234f8b970f26b2a8b9594946f8cd2518b01f695f99804b5eb6da18f2fde99a629553630e8d1b998c4923fb9e5
-
Filesize
168KB
MD594fe2ae79f875db2e57049af87e70399
SHA13330a03c8e18d9ca5b168e32c2e5fbfdfead4798
SHA256f22dad8fbae22d56790072d6331d84b03f847fbd72ec143a5cd5ecb212e6ae25
SHA51209b0c501a0fc8a8549a405f9550aa72041747a6b7bfc8bfc3726c5bf96da5a8e3f182122de830fdebdd6e01bb6818332a0e743bc66ff7a33ab2d0e0a056d8ec9
-
Filesize
168KB
MD59273e5e45a521de50489bd5199c50aa3
SHA1ae29f313340b74c9f436410e617d4c4012354156
SHA256aa646d5703fabf2bdbfcc7d84704f9f8d8ca37fe9c6e0738f6f69ed099eb7bfe
SHA512b9a98c3e4d43557d02a0b08a425a1cfad314eb1c1a171a04e4f626d5c1d75865c961771c2d82216686d13308aa283b54f2f92ec853db830f74fc43ec9e8938d4
-
Filesize
168KB
MD508aff29f564a04f881e78a8ff2095cc8
SHA1bc325787e1221937f0d65cd301e87a68501e21e2
SHA2568de640867f7190827e8e9db91706e3c79d9b33d94dbf73d61574371a87b06abc
SHA512e370ff58f3db3fbaf8d986c2a98c9ec91a5741dc738bc26e81340ce5c510d34b1d23c07de9ab36f0bbe538d5f07daf07202ade6ccb9f740322f136f7be2c95c5
-
Filesize
168KB
MD52c6a8282abc9b58a29c51a31b783ae2b
SHA143167f49c10ad1ec7524c7c9fb8dfafba6c8701c
SHA2567999fe902823d6509e95e43a0c182871ea46fd6bfabc769a2b41c184fb317e5b
SHA51242e2741b6cc57755ff9910ee29f7c1d514173e99292c869459e71e66636a2c3626b21a06136fc6afbdba61ec4a311f9af46b3d86cd81cb6b5bbbebe20ac71e0a
-
Filesize
168KB
MD5665d4b913c2a8a9dceaacecc5097e90e
SHA12745904b260bcc3f60f3871943839a48d24e40a6
SHA256b767e84dcefa087954f47abc9ef25581cb16019c5feaba1924ae421689565238
SHA5127264b0d82a5baa45fd186310081ce5c18a8007f8d8ef21488f264e869dce85ff0fee02e1fd84c80e333c20e0a079786de1faca354bd4800132037181cd435a40