Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe
-
Size
408KB
-
MD5
d14ba25a6b9216e29ea7c09897a9033e
-
SHA1
c129db851911266f41dea28a7e1dc2923869f74b
-
SHA256
41a574da9509dcd9c8f081751eef4440ec4b393e7874684e1d5ac6eebd1ec097
-
SHA512
51d4a6e7ddfb76fd12a1d284f333afcfb2c52cc99e9bf5f6c1baeff966560ea5a2ad88046c78d802f2fa42aa5c5a89cf2a20761f049eefb7690cc6445631d2e6
-
SSDEEP
3072:CEGh0o9l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGrldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E} {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}\stubpath = "C:\\Windows\\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe" {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{106332EE-DB03-4b46-8AB1-595D6EAC28FE} {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{106332EE-DB03-4b46-8AB1-595D6EAC28FE}\stubpath = "C:\\Windows\\{106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exe" {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}\stubpath = "C:\\Windows\\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe" {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B7B7670-B74E-47f8-BE8C-97010D6F5763} {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3} {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D} {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}\stubpath = "C:\\Windows\\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe" {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85FCE002-D584-4a79-A382-D679DE537EF2} {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{85FCE002-D584-4a79-A382-D679DE537EF2}\stubpath = "C:\\Windows\\{85FCE002-D584-4a79-A382-D679DE537EF2}.exe" {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A38D8630-18EB-4b2d-A2D4-9069C54D438E}\stubpath = "C:\\Windows\\{A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe" {85FCE002-D584-4a79-A382-D679DE537EF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405} {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405}\stubpath = "C:\\Windows\\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe" {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B7B7670-B74E-47f8-BE8C-97010D6F5763}\stubpath = "C:\\Windows\\{0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe" {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}\stubpath = "C:\\Windows\\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe" {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A38D8630-18EB-4b2d-A2D4-9069C54D438E} {85FCE002-D584-4a79-A382-D679DE537EF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4638F66C-5116-45b9-962F-C3D59F4FC645} {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0} 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0}\stubpath = "C:\\Windows\\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe" 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C} {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4638F66C-5116-45b9-962F-C3D59F4FC645}\stubpath = "C:\\Windows\\{4638F66C-5116-45b9-962F-C3D59F4FC645}.exe" {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe -
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 1992 {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe 2024 {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe 2696 {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe 2344 {106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe File created C:\Windows\{106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exe {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe File created C:\Windows\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe File created C:\Windows\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe File created C:\Windows\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe File created C:\Windows\{85FCE002-D584-4a79-A382-D679DE537EF2}.exe {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe File created C:\Windows\{A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe {85FCE002-D584-4a79-A382-D679DE537EF2}.exe File created C:\Windows\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe File created C:\Windows\{4638F66C-5116-45b9-962F-C3D59F4FC645}.exe {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe File created C:\Windows\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe File created C:\Windows\{0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {85FCE002-D584-4a79-A382-D679DE537EF2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe Token: SeIncBasePriorityPrivilege 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe Token: SeIncBasePriorityPrivilege 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe Token: SeIncBasePriorityPrivilege 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe Token: SeIncBasePriorityPrivilege 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe Token: SeIncBasePriorityPrivilege 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe Token: SeIncBasePriorityPrivilege 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe Token: SeIncBasePriorityPrivilege 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe Token: SeIncBasePriorityPrivilege 1992 {FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe Token: SeIncBasePriorityPrivilege 2024 {1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe Token: SeIncBasePriorityPrivilege 2696 {4638F66C-5116-45b9-962F-C3D59F4FC645}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2016 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 28 PID 2868 wrote to memory of 2016 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 28 PID 2868 wrote to memory of 2016 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 28 PID 2868 wrote to memory of 2016 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 28 PID 2868 wrote to memory of 1648 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 29 PID 2868 wrote to memory of 1648 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 29 PID 2868 wrote to memory of 1648 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 29 PID 2868 wrote to memory of 1648 2868 2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe 29 PID 2016 wrote to memory of 1696 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 32 PID 2016 wrote to memory of 1696 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 32 PID 2016 wrote to memory of 1696 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 32 PID 2016 wrote to memory of 1696 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 32 PID 2016 wrote to memory of 3008 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 33 PID 2016 wrote to memory of 3008 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 33 PID 2016 wrote to memory of 3008 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 33 PID 2016 wrote to memory of 3008 2016 {945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe 33 PID 1696 wrote to memory of 2736 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 34 PID 1696 wrote to memory of 2736 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 34 PID 1696 wrote to memory of 2736 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 34 PID 1696 wrote to memory of 2736 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 34 PID 1696 wrote to memory of 2864 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 35 PID 1696 wrote to memory of 2864 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 35 PID 1696 wrote to memory of 2864 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 35 PID 1696 wrote to memory of 2864 1696 {0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe 35 PID 2736 wrote to memory of 2644 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 36 PID 2736 wrote to memory of 2644 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 36 PID 2736 wrote to memory of 2644 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 36 PID 2736 wrote to memory of 2644 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 36 PID 2736 wrote to memory of 2784 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 37 PID 2736 wrote to memory of 2784 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 37 PID 2736 wrote to memory of 2784 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 37 PID 2736 wrote to memory of 2784 2736 {3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe 37 PID 2644 wrote to memory of 2756 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 38 PID 2644 wrote to memory of 2756 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 38 PID 2644 wrote to memory of 2756 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 38 PID 2644 wrote to memory of 2756 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 38 PID 2644 wrote to memory of 2492 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 39 PID 2644 wrote to memory of 2492 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 39 PID 2644 wrote to memory of 2492 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 39 PID 2644 wrote to memory of 2492 2644 {D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe 39 PID 2756 wrote to memory of 2068 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 40 PID 2756 wrote to memory of 2068 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 40 PID 2756 wrote to memory of 2068 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 40 PID 2756 wrote to memory of 2068 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 40 PID 2756 wrote to memory of 2952 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 41 PID 2756 wrote to memory of 2952 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 41 PID 2756 wrote to memory of 2952 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 41 PID 2756 wrote to memory of 2952 2756 {85FCE002-D584-4a79-A382-D679DE537EF2}.exe 41 PID 2068 wrote to memory of 2380 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 42 PID 2068 wrote to memory of 2380 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 42 PID 2068 wrote to memory of 2380 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 42 PID 2068 wrote to memory of 2380 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 42 PID 2068 wrote to memory of 1344 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 43 PID 2068 wrote to memory of 1344 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 43 PID 2068 wrote to memory of 1344 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 43 PID 2068 wrote to memory of 1344 2068 {A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe 43 PID 2380 wrote to memory of 1992 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 44 PID 2380 wrote to memory of 1992 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 44 PID 2380 wrote to memory of 1992 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 44 PID 2380 wrote to memory of 1992 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 44 PID 2380 wrote to memory of 1792 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 45 PID 2380 wrote to memory of 1792 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 45 PID 2380 wrote to memory of 1792 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 45 PID 2380 wrote to memory of 1792 2380 {CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_d14ba25a6b9216e29ea7c09897a9033e_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exeC:\Windows\{945D29B0-AEB4-4e66-AEE3-82072C19B3E0}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exeC:\Windows\{0B7B7670-B74E-47f8-BE8C-97010D6F5763}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exeC:\Windows\{3DC8BB09-A796-4ba5-B5F0-DBAD53E074A3}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exeC:\Windows\{D7942DDB-5FBF-46e7-8E01-AE1B234ED52D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{85FCE002-D584-4a79-A382-D679DE537EF2}.exeC:\Windows\{85FCE002-D584-4a79-A382-D679DE537EF2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\{A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exeC:\Windows\{A38D8630-18EB-4b2d-A2D4-9069C54D438E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exeC:\Windows\{CEAE2DE3-1BB5-44e6-B850-A939DA275B7E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exeC:\Windows\{FB82183D-3FF0-4666-A00E-BEBB6DFAE405}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exeC:\Windows\{1463BDCE-E73B-4555-9EAF-1DB8606CEC3C}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\{4638F66C-5116-45b9-962F-C3D59F4FC645}.exeC:\Windows\{4638F66C-5116-45b9-962F-C3D59F4FC645}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\{106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exeC:\Windows\{106332EE-DB03-4b46-8AB1-595D6EAC28FE}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4638F~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1463B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB821~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CEAE2~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A38D8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{85FCE~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D7942~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3DC8B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B7B7~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{945D2~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD55c11b36f55ef62150c89099422f8e393
SHA189e246565807318feb45dd2f31e09c11233e129c
SHA2566bb4b5d861193d4812b91cb2541d081c1995f525d5d39754915bc7397b6d3934
SHA5122fbca11656ce5f86d37b1edc8604bcd68047326d250782217023b0d69000f6cc723e2bca098bb66d8e0d61b9ba42373cc64c57fea37306c3eb8548778da48132
-
Filesize
408KB
MD5504226c64f7809f32017c9fd20d5dbba
SHA1b6e76855fb9049a299adca7b105662f2cbe8b093
SHA256b67d3ae3e8a51b4a468088502f36f09b86a044f2c900955180801dc72177d72a
SHA51261f858ef72992209a1c9234cd2543a28e38777415db969569973a681b1cf7a4a057acf2821609a1789672f23bd65e15791a1c2e756bc7136bd91c7cd83cb9626
-
Filesize
408KB
MD57ba6d1b2499015b76878ec5135862c39
SHA190c310df496f3623fc56275ebdc4795f271c6645
SHA25647f617c941314cbe45bb076c43c7ed46497e3843e4b6ee56bec3463217eff4a5
SHA5124be0fda46ad8ab2c7e3b0778d9d93f80c83fab9b7503430985b13168e6c51aa02f4ed1aebbad48cba515784874280236b22ba3cb262c0b6b5e7cb23124370597
-
Filesize
408KB
MD5bb8199c7e6bd8b526c47c1c906468961
SHA1ef17ebb2455eca02c1c7d781244d5757e88e2552
SHA256ab071eada838d6565347835775a29265eb773599320720a9c760f8bd527acf48
SHA51235f0981546ac48de2c9bc11789a1bb8c1785bd20fbaeb08b5ba4b289bbdd47b80bf2b77f8644d0e234ec16f4fdc72406223b2d3a9ed0275ee737342f6e396277
-
Filesize
408KB
MD56899b49a362546eb5fe9cbc1d523d7e4
SHA16282b9078d8ca90f992d3ce2dbc3b1a963bd487d
SHA2564816e5e6786bbcbd889d85517a81c5c92b3bc71f7837f078bb14f6043c065d49
SHA5124fda244d0771db4688e7bbf82f59dd881516d5a7ce21caacfb32fa77f07ddcf5a0f3c6d71602063fb01e9b39a019c2931146b50a450b00c9c265ed51e5498700
-
Filesize
408KB
MD59f1b1c3d7b40fec51787ca5b17aefde1
SHA150f32dbb0f5c4f08912d490fedc2ac1efce41f3e
SHA2567b54db9aa7b5c7ce97586bbeb5fac498a30ca44ea4a5b74f73fa4c3eca7ecbf3
SHA512897f597a93782c34b93f9fd8def44aa63b071f53bbf0419c7ec6f061ef62f6dc2455c38e0f0af8701d066607b894d605bb107afc1731b97f21ee2c0da357817a
-
Filesize
408KB
MD5bd6861c1230286c9e84b0e9f0ed56b3a
SHA108dab43ebadb209f9c41406cd04ebc6627cc2e8f
SHA256fa7c20deafdfa60186819b344082aee1f9c6afebc5bf9cf99c5c445f9cca5a66
SHA5122454d57ec50c768b8fa401340f62f054462d3a409a254ab2fbd422fa71bcb021cf8b65e2137af7f26d02c6b9b532a006de1771b138dc3a90a6f129ef8189c898
-
Filesize
408KB
MD505aa29f9448745ab310c3a8c33660a23
SHA1da01fc71756e2668b9895f319667cf6d3de3c44f
SHA2568f2a8a24021a20141e328885fb5c9e51aaf5c1a40340f6de94dffde3b12c771d
SHA512cb9c963cade105107537f36b6b20c9eb7beec7b84426eea04b50b8cc4622011def5d09ef6e8b212e29101e82390fbb765f3cd6914a0ad74d8faa4405d28bcd35
-
Filesize
408KB
MD5741fca1b2dc3654ab4f91196220699d5
SHA1701944e20d2922d4eccd863d3758a4b9e2f2bdae
SHA256fafc8d150ffab2e9de6ce249c79159ce547a48c91f2b6968f69bc44844929cec
SHA512eae589ae60f8f82bc679b332ae273ab86f3f6635c3e45243b33835c9d5006f669ff528d99122687140e339c8ee394e0eeaea83a731470f81e3b0bced16a7122e
-
Filesize
408KB
MD5d3c89f283dd2dab675d771868e9e0ee5
SHA115a754a041e4713a26acc8ae64f872d8d828761b
SHA256e942d122c618fb4e2642d09ae8de6a872a49ec0a302090e6731efc0e6604f150
SHA512d1386a06eab0f0441f4aefdf52f42a8c77d6b65d6a94fadb49fa61e842d967ad7c9699e0b7cff69a2ddc6392985b41dea5ccd4f2d4513a52824853d337bce0fc
-
Filesize
408KB
MD5589d6d344c65856cffb25357b46b7914
SHA1cf3e6a75c23e366471934ac5109e341832ca147a
SHA256bac0f3439aeb606bbc5d393e5ad7a65b80d5037e6b7661d3c02200646bf73b93
SHA5122ff88f5984e42ab692388b74d5986e8ed313180c9597f1f7344e866a72915333cab0ed76d72bf8e6af4f8b63068f694d107c3a0b87a8605bcef34c983cc8532d