Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe
-
Size
380KB
-
MD5
bdee278f036d2b64b87ffbb2cfd921d1
-
SHA1
1ca624d17d2c87ee6a716041a4c5d42c2a1f735a
-
SHA256
16547b4802e5229ef2d66cca3002c64f2011a49014015a6273b4e492fe3d3709
-
SHA512
a4ec5e1ce7d0a9ab69a6e51e59f530741a11cfca4da745bde3ffc9f1c3c7a8b1b1074a4361017b21680f577e761a1f94da6eb8f4be6e9db46395abd3a9818de0
-
SSDEEP
3072:mEGh0oxlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGnl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03AB166A-AAA9-4bff-8FFE-C24E5554A703} {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA} {BEC96927-3734-429c-A78D-49D15A8C6664}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}\stubpath = "C:\\Windows\\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe" {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760}\stubpath = "C:\\Windows\\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exe" {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1364166-4DFE-4946-B03A-A56F8F3B2553} {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}\stubpath = "C:\\Windows\\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe" {BEC96927-3734-429c-A78D-49D15A8C6664}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDFEC23D-B3A2-4f98-9684-884D2122B598} {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDFEC23D-B3A2-4f98-9684-884D2122B598}\stubpath = "C:\\Windows\\{EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe" {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}\stubpath = "C:\\Windows\\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe" {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242} {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B6B8676-2E39-4109-B2DA-A0FE39481848} 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03AB166A-AAA9-4bff-8FFE-C24E5554A703}\stubpath = "C:\\Windows\\{03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe" {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C} {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CFF5101-9816-4572-BFD5-9244125FEE6B} {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CFF5101-9816-4572-BFD5-9244125FEE6B}\stubpath = "C:\\Windows\\{5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe" {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}\stubpath = "C:\\Windows\\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe" {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B6B8676-2E39-4109-B2DA-A0FE39481848}\stubpath = "C:\\Windows\\{5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe" 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEC96927-3734-429c-A78D-49D15A8C6664} {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEC96927-3734-429c-A78D-49D15A8C6664}\stubpath = "C:\\Windows\\{BEC96927-3734-429c-A78D-49D15A8C6664}.exe" {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E} {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}\stubpath = "C:\\Windows\\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe" {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB} {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760} {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1364166-4DFE-4946-B03A-A56F8F3B2553}\stubpath = "C:\\Windows\\{A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe" {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe -
Executes dropped EXE 12 IoCs
pid Process 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe 3444 {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe 4408 {5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe File created C:\Windows\{EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe File created C:\Windows\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe File created C:\Windows\{5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe File created C:\Windows\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe File created C:\Windows\{5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe File created C:\Windows\{03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe File created C:\Windows\{BEC96927-3734-429c-A78D-49D15A8C6664}.exe {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe File created C:\Windows\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exe {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe File created C:\Windows\{A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe File created C:\Windows\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe {BEC96927-3734-429c-A78D-49D15A8C6664}.exe File created C:\Windows\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEC96927-3734-429c-A78D-49D15A8C6664}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe Token: SeIncBasePriorityPrivilege 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe Token: SeIncBasePriorityPrivilege 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe Token: SeIncBasePriorityPrivilege 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe Token: SeIncBasePriorityPrivilege 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe Token: SeIncBasePriorityPrivilege 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe Token: SeIncBasePriorityPrivilege 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe Token: SeIncBasePriorityPrivilege 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe Token: SeIncBasePriorityPrivilege 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe Token: SeIncBasePriorityPrivilege 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe Token: SeIncBasePriorityPrivilege 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe Token: SeIncBasePriorityPrivilege 3444 {A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4732 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 88 PID 4740 wrote to memory of 4732 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 88 PID 4740 wrote to memory of 4732 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 88 PID 4740 wrote to memory of 4628 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 89 PID 4740 wrote to memory of 4628 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 89 PID 4740 wrote to memory of 4628 4740 2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe 89 PID 4732 wrote to memory of 2220 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 90 PID 4732 wrote to memory of 2220 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 90 PID 4732 wrote to memory of 2220 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 90 PID 4732 wrote to memory of 2844 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 91 PID 4732 wrote to memory of 2844 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 91 PID 4732 wrote to memory of 2844 4732 {5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe 91 PID 2220 wrote to memory of 2044 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 94 PID 2220 wrote to memory of 2044 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 94 PID 2220 wrote to memory of 2044 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 94 PID 2220 wrote to memory of 2284 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 95 PID 2220 wrote to memory of 2284 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 95 PID 2220 wrote to memory of 2284 2220 {A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe 95 PID 2044 wrote to memory of 1508 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 96 PID 2044 wrote to memory of 1508 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 96 PID 2044 wrote to memory of 1508 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 96 PID 2044 wrote to memory of 1512 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 97 PID 2044 wrote to memory of 1512 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 97 PID 2044 wrote to memory of 1512 2044 {03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe 97 PID 1508 wrote to memory of 640 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 98 PID 1508 wrote to memory of 640 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 98 PID 1508 wrote to memory of 640 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 98 PID 1508 wrote to memory of 2728 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 99 PID 1508 wrote to memory of 2728 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 99 PID 1508 wrote to memory of 2728 1508 {BEC96927-3734-429c-A78D-49D15A8C6664}.exe 99 PID 640 wrote to memory of 3232 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 100 PID 640 wrote to memory of 3232 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 100 PID 640 wrote to memory of 3232 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 100 PID 640 wrote to memory of 2920 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 101 PID 640 wrote to memory of 2920 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 101 PID 640 wrote to memory of 2920 640 {A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe 101 PID 3232 wrote to memory of 3928 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 102 PID 3232 wrote to memory of 3928 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 102 PID 3232 wrote to memory of 3928 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 102 PID 3232 wrote to memory of 4972 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 103 PID 3232 wrote to memory of 4972 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 103 PID 3232 wrote to memory of 4972 3232 {F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe 103 PID 3928 wrote to memory of 3840 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 104 PID 3928 wrote to memory of 3840 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 104 PID 3928 wrote to memory of 3840 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 104 PID 3928 wrote to memory of 1032 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 105 PID 3928 wrote to memory of 1032 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 105 PID 3928 wrote to memory of 1032 3928 {EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe 105 PID 3840 wrote to memory of 1444 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 106 PID 3840 wrote to memory of 1444 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 106 PID 3840 wrote to memory of 1444 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 106 PID 3840 wrote to memory of 4100 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 107 PID 3840 wrote to memory of 4100 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 107 PID 3840 wrote to memory of 4100 3840 {ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe 107 PID 1444 wrote to memory of 5060 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 108 PID 1444 wrote to memory of 5060 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 108 PID 1444 wrote to memory of 5060 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 108 PID 1444 wrote to memory of 1616 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 109 PID 1444 wrote to memory of 1616 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 109 PID 1444 wrote to memory of 1616 1444 {05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe 109 PID 5060 wrote to memory of 3444 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe 110 PID 5060 wrote to memory of 3444 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe 110 PID 5060 wrote to memory of 3444 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe 110 PID 5060 wrote to memory of 3516 5060 {5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_bdee278f036d2b64b87ffbb2cfd921d1_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\{5B6B8676-2E39-4109-B2DA-A0FE39481848}.exeC:\Windows\{5B6B8676-2E39-4109-B2DA-A0FE39481848}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\{A1364166-4DFE-4946-B03A-A56F8F3B2553}.exeC:\Windows\{A1364166-4DFE-4946-B03A-A56F8F3B2553}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\{03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exeC:\Windows\{03AB166A-AAA9-4bff-8FFE-C24E5554A703}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{BEC96927-3734-429c-A78D-49D15A8C6664}.exeC:\Windows\{BEC96927-3734-429c-A78D-49D15A8C6664}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exeC:\Windows\{A6E80F4B-57F6-44c5-BDD3-BA3D377E68CA}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exeC:\Windows\{F2E9669B-CA4E-49a6-A638-5CCCEA1FD57E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\{EDFEC23D-B3A2-4f98-9684-884D2122B598}.exeC:\Windows\{EDFEC23D-B3A2-4f98-9684-884D2122B598}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exeC:\Windows\{ACEB4642-3B8A-46a2-8C50-42AFB84D2F9C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exeC:\Windows\{05E19FAF-BA43-4235-AFAA-0B7DCAEC5242}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\{5CFF5101-9816-4572-BFD5-9244125FEE6B}.exeC:\Windows\{5CFF5101-9816-4572-BFD5-9244125FEE6B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exeC:\Windows\{A93F46B9-1DFD-451d-9D1B-6E0619DF31BB}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3444 -
C:\Windows\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exeC:\Windows\{5D1404EF-B074-4ee6-8717-4B1EB1BE7760}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A93F4~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5CFF5~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05E19~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ACEB4~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDFEC~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F2E96~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6E80~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEC96~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03AB1~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1364~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5B6B8~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5b1dad5ce638fb73ee4dabb3816bc4973
SHA194f2771742789975f9c9061301b58d5f10766d23
SHA2561611dc264a3cbb8d651e332dbba3e47c2b80d73400c6cc2995749b9cf6866a21
SHA5122f4ea9d9680a4cc1cd6f5cfe46ad2eed79d9962fc0f1dd998d6043f9a2ae33957eaf412500f6b07cfaf1d3b71a41eddebb9caf3b6dadc5ba5c9a9bd1a1a4940f
-
Filesize
380KB
MD56f19e7ee7b97260ee3405d3c6a39b8b2
SHA16629d50d2804aa1ca5256d814a6a060343835b1b
SHA2562e024c29316f4b624546f72478991c88005be2de4b965c3192a5c46cce89b03d
SHA512aa508e25bd79b0621f0b43531a08c1f63485703d3ff406a5cbd8932b692cf5d1e6d32e1be94d76720fd100189049522a41902db28042ef6e0b643f4badf8de47
-
Filesize
380KB
MD57c792e879a2d5804ca0b8bfa49dfa3a8
SHA15f3a95af3958c907100f866dd11338815a3f0fb0
SHA256a4bf5b240bd7a6c86961c5233ce69281e4a4afb50a4c9f7dc2950c5366bb8963
SHA5127e68ff1e7506aa49bb8172d58c2ff356b9ef732fee8509fb908aa4b96fb332674a5e12907e71b15f96635f1b0a558452fc9fba2c826d856ebed2745ebab56fd3
-
Filesize
380KB
MD529674dc0a48b8e648e16f8ffba4f080e
SHA1e7c7aa420fdf17301a3424f70122405d32baea35
SHA2561145863d12bf04835913e8ce06841f52213fc200e773d90916dac917b4a95a75
SHA5128750009e9c155e3599559a90e4e8acede625b6a6b3f187d4f898f0cd94e461dcfd9399afc17d034d5bf77dd07a449c5472272837d2f24a880a4b7fb7e78dbce8
-
Filesize
380KB
MD51553c6fc95cbf8c201edd0e4cb2c878f
SHA1568d29adb95a8771afefd15014f4025ed7e56162
SHA256d82e21c4c57cc56cd8eeb69b64f8a62c65d240bd8f97f207df280433aba77c16
SHA512e14e4cc8cd4ba7da73c4d01e814a0aef16b4d5332baf8774b16451629e74f0554c97ed2cb95d4d3ca6660bf0e11ce2feb1b6ca8a145a413e02d442e8736b4602
-
Filesize
380KB
MD5576b0895cd91e11c874d1778c7dcf8ef
SHA190f076ea29051b0e75db5ac8458beb16681e5352
SHA256d73b6e075d07beea29ae13dbe40014e1c724f00659a849d393dedbe20d1f4ee8
SHA512ed0f1d82fd2eb308a742b645d6115521c93a9dc65a3651592501d64fda3981f708feb34769db5b310353fce4f3dbbc4b6d2c842b5842d53fe7ec0d7f6fec04ed
-
Filesize
380KB
MD562323499219c0e000c2ace70bc42c87c
SHA17de84e5ddb846228e907bbd0697103621f00ea8c
SHA2562b2f20d2c2ad519d36619d42b760aa54be29700a0b8feb5ff9c8d5dbb8103610
SHA512d74b10c4b39bfdda9ff28a9ec814fe2fe50f34bc1e0e20b7947035c14183b33152baaab7ec9d4941cd47fb4390e1fceebec839fb7ea79276dea23b8837047e21
-
Filesize
380KB
MD5568a252437c6a00a2d1f9b8a096e3817
SHA153fdc90fb96e4a03a2d22d4b011d21e41a9da583
SHA256ea62d577e755deec898b1354e80a79772f5d4ea9089a779d2dfcd01ee2b42bb1
SHA512f9c3aa67fb4f31522cebdce6d29cfc5aadefc952566a500dcac424ff9834a627ff4d055e85bcd16e48f6a275fc338c3e49efc2da73164212f1bd8ce6e2fe48f0
-
Filesize
380KB
MD55c24cf57affd4b4d049aedb5fd5afc54
SHA1f385ed373b60dbc2b4c2415f75be45a4b2377376
SHA256b472768fb962da4d9860817787f22270bbeef8e5e0599e94f5e7d325c74661be
SHA5121b701e65036ab04c3473f220db6d9012752c782425a5e8d64d6ae4ab5ee9ebfa54c4e21286014d92e4e72552165dc13b1da07aaac552b43dd74e41726fccc5b1
-
Filesize
380KB
MD5122523656c2937d44dfc837492e253f6
SHA1576347449282e40cbcd1d6dbb67b2b755d43cd0c
SHA25688189b8f8fdf6a3d9caa501c89bdfc95f3592bee34a8e628a46a74a25b5cced7
SHA512497c09bdbcd842c1e1589dfb642c1bf54fa2693ab6dd58e1a42d1dfd3ffaea8a5b8e77c21ca2526c4550c4722001ef5d2bc459ef8e372eafb00a2d02a09fe7bc
-
Filesize
380KB
MD57b6af423215f773845491c365a5a1e55
SHA1390de662b7a95f5149ef1c8efee034a398a11972
SHA2565fc81c4c484918f1ec1c000a3ded510b8a4132fb29e257e6b10373d6695a293c
SHA512b7aba2fa123d1fb5b24411777c3845b0518ddcacfc0b8da7b8c3c7d566d4cca35466efe39782cea2ae78b27072664aaeced9318943dd48750a4329e36dffa9fb
-
Filesize
380KB
MD560c6f8f9f24836f89340be8bc9b37f2a
SHA1a6d035e2ac24400e68f0ed1d5a4ce873d99a930b
SHA25643e7012f83a262c1b92cccfef0a21ac75540b96ecb6264286a6ef7423973f0ad
SHA5120e070eae35da4d207a3f369ef2caa29a056369e6b387ab30ebea77ea520cd9486dbaa9fbd1cc4f0c7b1ddeb756c7d259773fa6bb4f3e4e66eeae3bf93a159fd0