Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe
-
Size
180KB
-
MD5
1647bc7800de220ae22272f0226f5b37
-
SHA1
671eb6f1e331a6751c58e0fadfc14e019865552d
-
SHA256
9af74d3ddbb234e34576832d18ab62f0f2ae1d2e4505897d4923737fff6fa687
-
SHA512
3fe3e8d831fc2652bceedec1e6223ec01285b290be1c59c7120ede088fc6e44424c8b5894accd10233abf0deaee9f9f1d01837e3ee6bd77bc1a6ee250a1a59f4
-
SSDEEP
3072:jEGh0oOlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGgl5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1}\stubpath = "C:\\Windows\\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe" {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5} {6C0BE88E-7173-4f38-A947-02494C912670}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1B72F90-8A78-4475-AD30-536BBA6B846F}\stubpath = "C:\\Windows\\{A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe" {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{177ACF8A-6D34-4831-87B7-1DA775DD76BB} 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{177ACF8A-6D34-4831-87B7-1DA775DD76BB}\stubpath = "C:\\Windows\\{177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe" 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1241110-100F-4214-A430-F89F71AE68A9} {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C1241110-100F-4214-A430-F89F71AE68A9}\stubpath = "C:\\Windows\\{C1241110-100F-4214-A430-F89F71AE68A9}.exe" {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2} {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}\stubpath = "C:\\Windows\\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe" {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A255D877-EE11-47fe-BB95-B11E20B2F937} {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A255D877-EE11-47fe-BB95-B11E20B2F937}\stubpath = "C:\\Windows\\{A255D877-EE11-47fe-BB95-B11E20B2F937}.exe" {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1} {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C0BE88E-7173-4f38-A947-02494C912670} {E6E415B9-80ED-4001-A8D3-F61977084398}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C0BE88E-7173-4f38-A947-02494C912670}\stubpath = "C:\\Windows\\{6C0BE88E-7173-4f38-A947-02494C912670}.exe" {E6E415B9-80ED-4001-A8D3-F61977084398}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E6E415B9-80ED-4001-A8D3-F61977084398} {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E6E415B9-80ED-4001-A8D3-F61977084398}\stubpath = "C:\\Windows\\{E6E415B9-80ED-4001-A8D3-F61977084398}.exe" {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5}\stubpath = "C:\\Windows\\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe" {6C0BE88E-7173-4f38-A947-02494C912670}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A1B72F90-8A78-4475-AD30-536BBA6B846F} {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F58BB6FA-2D83-453c-B7C9-381E48A645B4}\stubpath = "C:\\Windows\\{F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exe" {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1148F95A-4D12-4976-9500-B8E7EB6911E3} {C1241110-100F-4214-A430-F89F71AE68A9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1148F95A-4D12-4976-9500-B8E7EB6911E3}\stubpath = "C:\\Windows\\{1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe" {C1241110-100F-4214-A430-F89F71AE68A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F58BB6FA-2D83-453c-B7C9-381E48A645B4} {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe -
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 1752 {6C0BE88E-7173-4f38-A947-02494C912670}.exe 2528 {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe 2952 {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe 376 {F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exe {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe File created C:\Windows\{177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe File created C:\Windows\{1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe {C1241110-100F-4214-A430-F89F71AE68A9}.exe File created C:\Windows\{A255D877-EE11-47fe-BB95-B11E20B2F937}.exe {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe File created C:\Windows\{6C0BE88E-7173-4f38-A947-02494C912670}.exe {E6E415B9-80ED-4001-A8D3-F61977084398}.exe File created C:\Windows\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe {6C0BE88E-7173-4f38-A947-02494C912670}.exe File created C:\Windows\{A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe File created C:\Windows\{C1241110-100F-4214-A430-F89F71AE68A9}.exe {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe File created C:\Windows\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe File created C:\Windows\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe File created C:\Windows\{E6E415B9-80ED-4001-A8D3-F61977084398}.exe {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C1241110-100F-4214-A430-F89F71AE68A9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E6E415B9-80ED-4001-A8D3-F61977084398}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C0BE88E-7173-4f38-A947-02494C912670}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe Token: SeIncBasePriorityPrivilege 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe Token: SeIncBasePriorityPrivilege 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe Token: SeIncBasePriorityPrivilege 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe Token: SeIncBasePriorityPrivilege 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe Token: SeIncBasePriorityPrivilege 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe Token: SeIncBasePriorityPrivilege 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe Token: SeIncBasePriorityPrivilege 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe Token: SeIncBasePriorityPrivilege 1752 {6C0BE88E-7173-4f38-A947-02494C912670}.exe Token: SeIncBasePriorityPrivilege 2528 {B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe Token: SeIncBasePriorityPrivilege 2952 {A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2540 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 28 PID 1288 wrote to memory of 2540 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 28 PID 1288 wrote to memory of 2540 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 28 PID 1288 wrote to memory of 2540 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 28 PID 1288 wrote to memory of 2280 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 29 PID 1288 wrote to memory of 2280 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 29 PID 1288 wrote to memory of 2280 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 29 PID 1288 wrote to memory of 2280 1288 2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe 29 PID 2540 wrote to memory of 2588 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 32 PID 2540 wrote to memory of 2588 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 32 PID 2540 wrote to memory of 2588 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 32 PID 2540 wrote to memory of 2588 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 32 PID 2540 wrote to memory of 2716 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 33 PID 2540 wrote to memory of 2716 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 33 PID 2540 wrote to memory of 2716 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 33 PID 2540 wrote to memory of 2716 2540 {177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe 33 PID 2588 wrote to memory of 3052 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 34 PID 2588 wrote to memory of 3052 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 34 PID 2588 wrote to memory of 3052 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 34 PID 2588 wrote to memory of 3052 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 34 PID 2588 wrote to memory of 2332 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 35 PID 2588 wrote to memory of 2332 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 35 PID 2588 wrote to memory of 2332 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 35 PID 2588 wrote to memory of 2332 2588 {C1241110-100F-4214-A430-F89F71AE68A9}.exe 35 PID 3052 wrote to memory of 2596 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 36 PID 3052 wrote to memory of 2596 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 36 PID 3052 wrote to memory of 2596 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 36 PID 3052 wrote to memory of 2596 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 36 PID 3052 wrote to memory of 2504 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 37 PID 3052 wrote to memory of 2504 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 37 PID 3052 wrote to memory of 2504 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 37 PID 3052 wrote to memory of 2504 3052 {1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe 37 PID 2596 wrote to memory of 2536 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 38 PID 2596 wrote to memory of 2536 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 38 PID 2596 wrote to memory of 2536 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 38 PID 2596 wrote to memory of 2536 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 38 PID 2596 wrote to memory of 2924 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 39 PID 2596 wrote to memory of 2924 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 39 PID 2596 wrote to memory of 2924 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 39 PID 2596 wrote to memory of 2924 2596 {5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe 39 PID 2536 wrote to memory of 1932 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 40 PID 2536 wrote to memory of 1932 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 40 PID 2536 wrote to memory of 1932 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 40 PID 2536 wrote to memory of 1932 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 40 PID 2536 wrote to memory of 2212 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 41 PID 2536 wrote to memory of 2212 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 41 PID 2536 wrote to memory of 2212 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 41 PID 2536 wrote to memory of 2212 2536 {A255D877-EE11-47fe-BB95-B11E20B2F937}.exe 41 PID 1932 wrote to memory of 1896 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 42 PID 1932 wrote to memory of 1896 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 42 PID 1932 wrote to memory of 1896 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 42 PID 1932 wrote to memory of 1896 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 42 PID 1932 wrote to memory of 2384 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 43 PID 1932 wrote to memory of 2384 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 43 PID 1932 wrote to memory of 2384 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 43 PID 1932 wrote to memory of 2384 1932 {1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe 43 PID 1896 wrote to memory of 1752 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 44 PID 1896 wrote to memory of 1752 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 44 PID 1896 wrote to memory of 1752 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 44 PID 1896 wrote to memory of 1752 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 44 PID 1896 wrote to memory of 1812 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 45 PID 1896 wrote to memory of 1812 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 45 PID 1896 wrote to memory of 1812 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 45 PID 1896 wrote to memory of 1812 1896 {E6E415B9-80ED-4001-A8D3-F61977084398}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-21_1647bc7800de220ae22272f0226f5b37_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\{177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exeC:\Windows\{177ACF8A-6D34-4831-87B7-1DA775DD76BB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{C1241110-100F-4214-A430-F89F71AE68A9}.exeC:\Windows\{C1241110-100F-4214-A430-F89F71AE68A9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\{1148F95A-4D12-4976-9500-B8E7EB6911E3}.exeC:\Windows\{1148F95A-4D12-4976-9500-B8E7EB6911E3}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exeC:\Windows\{5A6B0A7B-94D8-460a-B3E2-F7A72CE7AFF2}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\{A255D877-EE11-47fe-BB95-B11E20B2F937}.exeC:\Windows\{A255D877-EE11-47fe-BB95-B11E20B2F937}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exeC:\Windows\{1BCDB1EA-475D-4e11-A13A-31BFA60336B1}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\{E6E415B9-80ED-4001-A8D3-F61977084398}.exeC:\Windows\{E6E415B9-80ED-4001-A8D3-F61977084398}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\{6C0BE88E-7173-4f38-A947-02494C912670}.exeC:\Windows\{6C0BE88E-7173-4f38-A947-02494C912670}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exeC:\Windows\{B1B09DEB-91A4-4068-81AF-B1A2C84345B5}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\{A1B72F90-8A78-4475-AD30-536BBA6B846F}.exeC:\Windows\{A1B72F90-8A78-4475-AD30-536BBA6B846F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\{F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exeC:\Windows\{F58BB6FA-2D83-453c-B7C9-381E48A645B4}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1B72~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1B09~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C0BE~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E6E41~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1BCDB~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A255D~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5A6B0~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1148F~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C1241~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{177AC~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD54e9fab20e16158026d2e107a1a3f14c6
SHA1d051a67dd9c6938d23343c172e589ed2e94d17ca
SHA256d02a2bbbf62854d2244474ffc066d54f573a59bb25314680f8b47f2cb62002bd
SHA5125511cf61d6560f880e4e88d576633e704eeab5c19f4f570468dbe975b96f9b767f3beab6cb4942515cd92b0dd4ddba67fed37060dd4a664409ed800c9e12de79
-
Filesize
180KB
MD593f602878f15e1ad65f2f34c9e0e6edb
SHA15b2829a60deb8dd38745cb46965aaeaef07621c2
SHA256ed81e638bda262a228f8d7323ccc21beeac9dd8b8cba75423732c0a4a1547df1
SHA5126dbdf5ecb38c07ac10b9eae8d9cf50fd31edf9ba65a6c4172435e177d9d90a644c7916746785f2d64a2ba0a3579fc99aad87a236c93931e06d668c6d2964351d
-
Filesize
180KB
MD5f23d8d7501a60bc90a0ecaa37f09e7cc
SHA1081439b0efea2bcd2dd9e93938d31780f8017e9d
SHA256b18e04d04b39302e706a5d79ef1dc30da8c16a6b3f73aa7352e7388b80c4f7ae
SHA512c79e118d531e0dfca909044439bcae551c10c723a3db11fa523fbffcf5baa5720e91176c98d50a18b74b15c1f47591d1424fcf9bc99ccfe8efdacf91ddc15e51
-
Filesize
180KB
MD5458d538791ff922edb84cdd3d3136ca2
SHA168068a161cd216bed55c95281aa6e608b93fb02f
SHA2566bed297c91be028345ec2691d3f979d32ed0ea7ac5189b8800d9028977789516
SHA51203a89363b89f73ecfa9334c7485b0929916ae750310c2f0e7a1a4e405e15a1dca3ff1913dd2f8f66d3e2da37561ac754cdd8ed4286d358df47cc27ab74a2fccd
-
Filesize
180KB
MD5451981305e0b5055d1a5b0a668c85682
SHA121a5f4ad7b8a6f8d7f328204111d3842d81eaeb9
SHA256c6868327b2d832dfc171474be9749e46dbb4ee4fe5cba0cd43c4908391d48eef
SHA512db26422f277a9805d48ac71632e6313ae97fead0237adcdb3f76f0522da1e16e44ffd14885c27c2e2988b65f2bade4143315693402c69ff9dad98b5deddc7b55
-
Filesize
180KB
MD51a396fcd835c362b7df67b1fded8c2e0
SHA1ba2e18f86555aa9a0e12401daef196d101cce7d5
SHA256b64a5c150a185d15894dd145f1cc4cc00a3b6cacff415372baed0af5cb83ab77
SHA512f1ee35354fbb38e51e354fdf92156826871b6a4829ba8cc703084ea4fb94dc5d9c0fac12721e967e192450fadace3985f360f0654e6876ea2415ca5aa87b098d
-
Filesize
180KB
MD5a493131b67f32e1733ddd290a1191340
SHA1b5d9ad01800f2e42b06f6e0c03e14c79248fe759
SHA2560fb3532141b6ea8b5626745a04b51653a7520f7eca0afb3f27ff81ea1b435b2d
SHA512b59913522763e8b09d7dc624fbb8e58e3b5a685107eb06a80e0034aa351972b51d09eb97ab9da8db5641864c1904a84af80763ffdf2ec5c7b7bdd02613249cfc
-
Filesize
180KB
MD594f99762d8829df7b55737c3097bf1ed
SHA1c9395c5e7337aa0a4dfbbe8a23943a07de270af5
SHA2560ec98617fa1a67c20ef4881fd8d2746d2e723f03c21c454d4ff824b2650f6f80
SHA5127d77d6dff1baa77332b54996e480a6c1814e1dd6dab1f24387b1a127012670b189f4544b3347f4624834f427a293efb5091fc9f0900e5b5b804aaa26d5e8af80
-
Filesize
180KB
MD5727f2d17a679e50e24e4bd7f327d433f
SHA18777c30605339dccd2e71e915d7e840c0ce40c1b
SHA2568a7a6a1cae02abc5323d7c47d0123d1b39c83014287c4a4d0d46cecc4f89affa
SHA5125e2fa9cfe589ce3e65632fc2611d5b28fba01bb0b8d284d6a0bc45e9db501874e6501519686e363a73c5dd92bffc6185ea4dbb214d681d3bda5f603aeb158b96
-
Filesize
180KB
MD5229344aa12068655d7776c72e343347d
SHA16cc5a7384ed7d2fbb4a3af6dbc0efa5412325ae1
SHA25604f02c58585bca560a6e0df3bc3fbd4436b66c3945086fc770c6b5f03a1edc91
SHA51283dec7d1a30266949b8a2007280b6819b7c1449c0ca54f8a60c60398b0ee2cf2682068d6834fba2d8ecf7254275e5e2df497b2e5c4bb266dc05aedaaad8442a7
-
Filesize
180KB
MD5eb34be88be5cf1334dc86a857619a308
SHA179882be892837f181b5052b13d7c6da85242af55
SHA2565cab9db838e1760d7987fef4a7afcd4ca4b7360113dd9ebce4a73d2ddda98b6e
SHA5125b2864aea5406a38a7387517db576452b98720fc952655690b927c01878c4c6a63a38fce76fcca30a5bdc373108a01c5e9062d1b8c765babb3f6b248ae216de6