Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe
-
Size
168KB
-
MD5
920e191788282171ef9e5d69ff76cb45
-
SHA1
95bf8d4e49b254af17f8325fede96b3a293d06f0
-
SHA256
176bc3ca2b32f8bdf27f1e9fd2311a3a445b682c4335d008024835ed5b579f43
-
SHA512
ed6b1f563a9b946ec498b46a18e1da8aecf460efb16f8535e8c83ad8741f1cd06541997f9942bd99a4a58714a7a14e07e7f1bc243184422a64bccca93c7556ab
-
SSDEEP
1536:1EGh0oJlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oJlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C71B01D5-D848-4371-B705-A84598EE332E}\stubpath = "C:\\Windows\\{C71B01D5-D848-4371-B705-A84598EE332E}.exe" {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}\stubpath = "C:\\Windows\\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe" {C71B01D5-D848-4371-B705-A84598EE332E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB} {86E37644-0955-433f-89E1-F7CF49F88D75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{810C81A3-A2CB-466d-8A0C-8E2942017F27} {71DA273F-806E-4f2c-A928-1154888F7F24}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{810C81A3-A2CB-466d-8A0C-8E2942017F27}\stubpath = "C:\\Windows\\{810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe" {71DA273F-806E-4f2c-A928-1154888F7F24}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A} {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}\stubpath = "C:\\Windows\\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe" {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C71B01D5-D848-4371-B705-A84598EE332E} {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71DA273F-806E-4f2c-A928-1154888F7F24} {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71DA273F-806E-4f2c-A928-1154888F7F24}\stubpath = "C:\\Windows\\{71DA273F-806E-4f2c-A928-1154888F7F24}.exe" {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05B4FC28-6B17-41d3-9CAE-F3309430B54A} {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86E37644-0955-433f-89E1-F7CF49F88D75} {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC} 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A}\stubpath = "C:\\Windows\\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe" {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05B4FC28-6B17-41d3-9CAE-F3309430B54A}\stubpath = "C:\\Windows\\{05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe" {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A} {C71B01D5-D848-4371-B705-A84598EE332E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B01D0CAE-F553-42a1-9E00-D158BCA1696A}\stubpath = "C:\\Windows\\{B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exe" {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}\stubpath = "C:\\Windows\\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe" 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2} {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86E37644-0955-433f-89E1-F7CF49F88D75}\stubpath = "C:\\Windows\\{86E37644-0955-433f-89E1-F7CF49F88D75}.exe" {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}\stubpath = "C:\\Windows\\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe" {86E37644-0955-433f-89E1-F7CF49F88D75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B01D0CAE-F553-42a1-9E00-D158BCA1696A} {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe -
Deletes itself 1 IoCs
pid Process 2240 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 1380 {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe 2440 {86E37644-0955-433f-89E1-F7CF49F88D75}.exe 344 {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe 2984 {B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe {C71B01D5-D848-4371-B705-A84598EE332E}.exe File created C:\Windows\{B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exe {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe File created C:\Windows\{71DA273F-806E-4f2c-A928-1154888F7F24}.exe {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe File created C:\Windows\{810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe {71DA273F-806E-4f2c-A928-1154888F7F24}.exe File created C:\Windows\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe File created C:\Windows\{C71B01D5-D848-4371-B705-A84598EE332E}.exe {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe File created C:\Windows\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe {86E37644-0955-433f-89E1-F7CF49F88D75}.exe File created C:\Windows\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe File created C:\Windows\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe File created C:\Windows\{05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe File created C:\Windows\{86E37644-0955-433f-89E1-F7CF49F88D75}.exe {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C71B01D5-D848-4371-B705-A84598EE332E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {86E37644-0955-433f-89E1-F7CF49F88D75}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71DA273F-806E-4f2c-A928-1154888F7F24}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe Token: SeIncBasePriorityPrivilege 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe Token: SeIncBasePriorityPrivilege 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe Token: SeIncBasePriorityPrivilege 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe Token: SeIncBasePriorityPrivilege 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe Token: SeIncBasePriorityPrivilege 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe Token: SeIncBasePriorityPrivilege 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe Token: SeIncBasePriorityPrivilege 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe Token: SeIncBasePriorityPrivilege 1380 {07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe Token: SeIncBasePriorityPrivilege 2440 {86E37644-0955-433f-89E1-F7CF49F88D75}.exe Token: SeIncBasePriorityPrivilege 344 {F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2488 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 31 PID 2972 wrote to memory of 2488 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 31 PID 2972 wrote to memory of 2488 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 31 PID 2972 wrote to memory of 2488 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 31 PID 2972 wrote to memory of 2240 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 32 PID 2972 wrote to memory of 2240 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 32 PID 2972 wrote to memory of 2240 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 32 PID 2972 wrote to memory of 2240 2972 2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe 32 PID 2488 wrote to memory of 2844 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 33 PID 2488 wrote to memory of 2844 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 33 PID 2488 wrote to memory of 2844 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 33 PID 2488 wrote to memory of 2844 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 33 PID 2488 wrote to memory of 2900 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 34 PID 2488 wrote to memory of 2900 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 34 PID 2488 wrote to memory of 2900 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 34 PID 2488 wrote to memory of 2900 2488 {14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe 34 PID 2844 wrote to memory of 2872 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 35 PID 2844 wrote to memory of 2872 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 35 PID 2844 wrote to memory of 2872 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 35 PID 2844 wrote to memory of 2872 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 35 PID 2844 wrote to memory of 2856 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 36 PID 2844 wrote to memory of 2856 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 36 PID 2844 wrote to memory of 2856 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 36 PID 2844 wrote to memory of 2856 2844 {71DA273F-806E-4f2c-A928-1154888F7F24}.exe 36 PID 2872 wrote to memory of 1700 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 37 PID 2872 wrote to memory of 1700 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 37 PID 2872 wrote to memory of 1700 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 37 PID 2872 wrote to memory of 1700 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 37 PID 2872 wrote to memory of 2584 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 38 PID 2872 wrote to memory of 2584 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 38 PID 2872 wrote to memory of 2584 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 38 PID 2872 wrote to memory of 2584 2872 {810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe 38 PID 1700 wrote to memory of 2904 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 39 PID 1700 wrote to memory of 2904 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 39 PID 1700 wrote to memory of 2904 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 39 PID 1700 wrote to memory of 2904 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 39 PID 1700 wrote to memory of 2180 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 40 PID 1700 wrote to memory of 2180 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 40 PID 1700 wrote to memory of 2180 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 40 PID 1700 wrote to memory of 2180 1700 {A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe 40 PID 2904 wrote to memory of 2412 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 41 PID 2904 wrote to memory of 2412 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 41 PID 2904 wrote to memory of 2412 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 41 PID 2904 wrote to memory of 2412 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 41 PID 2904 wrote to memory of 1388 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 42 PID 2904 wrote to memory of 1388 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 42 PID 2904 wrote to memory of 1388 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 42 PID 2904 wrote to memory of 1388 2904 {32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe 42 PID 2412 wrote to memory of 1632 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 43 PID 2412 wrote to memory of 1632 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 43 PID 2412 wrote to memory of 1632 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 43 PID 2412 wrote to memory of 1632 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 43 PID 2412 wrote to memory of 836 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 44 PID 2412 wrote to memory of 836 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 44 PID 2412 wrote to memory of 836 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 44 PID 2412 wrote to memory of 836 2412 {05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe 44 PID 1632 wrote to memory of 1380 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 45 PID 1632 wrote to memory of 1380 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 45 PID 1632 wrote to memory of 1380 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 45 PID 1632 wrote to memory of 1380 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 45 PID 1632 wrote to memory of 2924 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 46 PID 1632 wrote to memory of 2924 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 46 PID 1632 wrote to memory of 2924 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 46 PID 1632 wrote to memory of 2924 1632 {C71B01D5-D848-4371-B705-A84598EE332E}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_920e191788282171ef9e5d69ff76cb45_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exeC:\Windows\{14E9C4BC-F690-402a-AE91-2D8DEBACEAFC}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{71DA273F-806E-4f2c-A928-1154888F7F24}.exeC:\Windows\{71DA273F-806E-4f2c-A928-1154888F7F24}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\{810C81A3-A2CB-466d-8A0C-8E2942017F27}.exeC:\Windows\{810C81A3-A2CB-466d-8A0C-8E2942017F27}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exeC:\Windows\{A65F6831-9DAC-4553-B2C2-2BEB39FC617A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exeC:\Windows\{32D444BF-573F-4b19-B9E4-87D2F8FFB9E2}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\{05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exeC:\Windows\{05B4FC28-6B17-41d3-9CAE-F3309430B54A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\{C71B01D5-D848-4371-B705-A84598EE332E}.exeC:\Windows\{C71B01D5-D848-4371-B705-A84598EE332E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exeC:\Windows\{07A54374-BA7D-4f15-ACFD-D5FFEBFB816A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\{86E37644-0955-433f-89E1-F7CF49F88D75}.exeC:\Windows\{86E37644-0955-433f-89E1-F7CF49F88D75}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exeC:\Windows\{F2EAC4D0-B6F8-4215-9592-2D76C8FC55EB}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:344 -
C:\Windows\{B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exeC:\Windows\{B01D0CAE-F553-42a1-9E00-D158BCA1696A}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F2EAC~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86E37~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07A54~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C71B0~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05B4F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32D44~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A65F6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{810C8~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71DA2~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{14E9C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ceeba654badc52a7791b1fe7c89ea2b5
SHA121e4b0066d5575e9d6d4fa95f3f2970af33ba89a
SHA256dc092d2728f9d5ca7af120e018da60a7226517d0408c90f710c805ac5b24a8f8
SHA512822589534ec2531eb7ced79a5ac91812e04067e0667721a7a1e225a963916dee64421717a64d164fff2ffec01797fb8a738e101e4a095a137b126f626ff20dd9
-
Filesize
168KB
MD5719a8df5ba97b93d2cecb85c0b7073f1
SHA13e16704dce99776b56de0614728f38b12abf4a54
SHA25606d6cb662cee4ddab27d02ed3931235f08978b8e6a3d543bd869150ee06d00a3
SHA5124eda691664c4c1949277ba8909eec9cc72c04a28dbe2edcf1c18a2e0c88b464f091b1fd589c00eb9bc9c6e8c26545f52af73f06241f0167b00471ffee905e286
-
Filesize
168KB
MD5006b53febe3e5b4f9230443d98fc90cf
SHA1608ef37a99880ae8ac9fff758acf42f122b05720
SHA25699c29173cb834605d234704bee5bc6bde55f35cc89a1d2011ef54b7f07f16f79
SHA512727ecd6b9beffe5d854823b21b8df4390e04734876c60a6ae5a7ca5d28c87b78e1975c5b493e438b2736c5deed62b379741905789d65f7e12e10106864c39d27
-
Filesize
168KB
MD516d58577715f173995423c2349d31bce
SHA13cbf73a9b75dfd176aef34ef2f274e53ca522f06
SHA256952faa7bef1b8f4957564953a78c260a6f31e0a16cf667a9b9cf035d158faa02
SHA512858ea5779b51f1283c4f0cbc4e8a1da276303aa85c519bdee4076d50b27e6b26ad6b9d6259bf3422a833ccf95bcdb39f2ed5fc32d8d296e733b32706192c1c7e
-
Filesize
168KB
MD56e3e2e81b23cd5ab3085c70fa7e0f106
SHA1b45c398165f1ab68feb4abf33f7a0dc332d5f306
SHA256569c6994256c0ce1cb0f9e2d46195e4b5b42d40cf682e00dcab884eb6fb685ce
SHA512997bfd844fd5db00e70c6911854e76b9ca7958beac11fc105b0e3e9ad25ddcdb70987812a018a23964479fc99cf0afee64c14b2937d7ceaa30da1c6cbd7a8f6c
-
Filesize
168KB
MD5a3a0559b6e333ba9b209574d6f3c49e1
SHA15d899c446fe86509edaddf29940abe8b52a7e4ae
SHA256d3415576353b695de4095a9544c4923a521e89086d011ea67b2ddadf3b9f4738
SHA5120afa3eea13d8bfecd022a5784f1d0e98f792f5f0e0748e3fdcfbf239e48432fa450fb1ef0f7b6480bcf75a33927a9749f0fe0519107583f6a95ba28f6bbec8be
-
Filesize
168KB
MD5cd427cef40bab824cd00e3c381215fc6
SHA152c86aa33c1486301c8f71f747a72a1880ee289b
SHA256eaf4c49618a6b449f3834d36b021ac966c5e905ef06fc8addc33452ef88ce2b5
SHA512b5067a8c75b7201db98f4a5ab7818b39b947721bbec7b8e32a0e7439028a45f15db101e9f9fe74a73578e6150b7feea399ae073dd88fdc36f670560049498ec9
-
Filesize
168KB
MD5405c31a35adef7e02ad9e75ad8fb1a5c
SHA162b87b7dfbd57471c6b33ec730a639c27d26472e
SHA256faadf076e62d191c1ee3088006f90c9d1f4895fd192bf12a67953f8a6986942f
SHA5122a10c31497287010f78fc405fea0ca0079dd86e14fe1fad3dc0fbdbf68efa9e913b1bbb26e40724b30144c1facf2e5ba417fbdc5d5a1fb42309528274968681d
-
Filesize
168KB
MD559bc828a37b12f05072b17ec32b44f2a
SHA1342371b83e9835662cb5b3aefefa325c6cd080a7
SHA256e9f7f8677721399d682541577085659ae93b294cb42446abd8bce227f79a70eb
SHA512fd8e985e31ce28c4daab5c1cbd15331d7c48ced1603901056a11fbcc3bc63b69d7bb84db45a4d72d5ca96a62d485145ea03dbd0559e68475cd26a41e028e1b36
-
Filesize
168KB
MD5ccd219afa47d09f468b119f34eefb497
SHA1b9babec0c2cfbae8023a07b2738a2cbef8a12ca3
SHA2564b91941ff35fc8127c023668f22b98748ce2489ccab1cb99a3d857eff0522fb3
SHA5125958d9a2b407e8b4a20bee8571d84d3a348722ec3837ba2a0b066f837c9373585c222512e4ec2ba6f90d1450a9fe3d72316cb3394371874e55d1a3c34ca03db7
-
Filesize
168KB
MD573d3d10755cd55e7be76c3bc323929a3
SHA1aef89db59a0604598fc8a7de18816bcd8f264548
SHA25635efd304613faf1934ee45e04e21a37b8e15b245a3774cbc4ce2c2b063bd55b4
SHA5128f8589ec118dbb11efb6f317349be1aa917229dd180d1be4f754d600f6974bb76d6e6e6fb72d8af1b5416e6761eecce16f97d615473754fcb05e08b154ff39b2