Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe
-
Size
204KB
-
MD5
56542454145bd6940ff909166b00a7da
-
SHA1
9dddb319d36425b3d240a7e78ccb61fb10f688e3
-
SHA256
04cfd8d3388d252b68ced2784b4a8d49ba751be51a3f0fa7b5510814b8f72bbc
-
SHA512
92ccd4117c0e3d56537aa460804d23330aefd63023b7db06e1d60b974bee79be8248444452dc92c5ac82cfc93b820e2584871cf203d1bde48df00e247dbc0825
-
SSDEEP
1536:1EGh0oxl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oxl1OPOe2MUVg3Ve+rXfMUy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65875551-BE58-48c0-BE21-0D5034807F34}\stubpath = "C:\\Windows\\{65875551-BE58-48c0-BE21-0D5034807F34}.exe" {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}\stubpath = "C:\\Windows\\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe" {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43DED986-3F40-4374-AFB0-387801380D3D} {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00C2F592-A342-483d-8922-AD4CD5C1D1A3}\stubpath = "C:\\Windows\\{00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe" {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF} {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}\stubpath = "C:\\Windows\\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exe" {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F904E7B-85EA-458e-8A56-317F7A8CB31A}\stubpath = "C:\\Windows\\{0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe" {796ACE98-4E4A-4ecd-861A-13698F015827}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D567E6A-790C-49bd-BA08-5716F1936519} {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D567E6A-790C-49bd-BA08-5716F1936519}\stubpath = "C:\\Windows\\{1D567E6A-790C-49bd-BA08-5716F1936519}.exe" {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F904E7B-85EA-458e-8A56-317F7A8CB31A} {796ACE98-4E4A-4ecd-861A-13698F015827}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65875551-BE58-48c0-BE21-0D5034807F34} {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0} {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454651D0-E252-4067-BBB0-D1F30DE0E7FF} {43DED986-3F40-4374-AFB0-387801380D3D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{454651D0-E252-4067-BBB0-D1F30DE0E7FF}\stubpath = "C:\\Windows\\{454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe" {43DED986-3F40-4374-AFB0-387801380D3D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B} 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF}\stubpath = "C:\\Windows\\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe" {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC} {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00C2F592-A342-483d-8922-AD4CD5C1D1A3} {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{796ACE98-4E4A-4ecd-861A-13698F015827} {1D567E6A-790C-49bd-BA08-5716F1936519}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{796ACE98-4E4A-4ecd-861A-13698F015827}\stubpath = "C:\\Windows\\{796ACE98-4E4A-4ecd-861A-13698F015827}.exe" {1D567E6A-790C-49bd-BA08-5716F1936519}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F577E50-3A50-4542-9C24-B3B841C5E10D} {65875551-BE58-48c0-BE21-0D5034807F34}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F577E50-3A50-4542-9C24-B3B841C5E10D}\stubpath = "C:\\Windows\\{5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe" {65875551-BE58-48c0-BE21-0D5034807F34}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{43DED986-3F40-4374-AFB0-387801380D3D}\stubpath = "C:\\Windows\\{43DED986-3F40-4374-AFB0-387801380D3D}.exe" {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}\stubpath = "C:\\Windows\\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe" 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe -
Executes dropped EXE 12 IoCs
pid Process 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe 1100 {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe 5104 {7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exe {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe File created C:\Windows\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe File created C:\Windows\{0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe {796ACE98-4E4A-4ecd-861A-13698F015827}.exe File created C:\Windows\{65875551-BE58-48c0-BE21-0D5034807F34}.exe {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe File created C:\Windows\{00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe File created C:\Windows\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe File created C:\Windows\{454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe {43DED986-3F40-4374-AFB0-387801380D3D}.exe File created C:\Windows\{1D567E6A-790C-49bd-BA08-5716F1936519}.exe {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe File created C:\Windows\{796ACE98-4E4A-4ecd-861A-13698F015827}.exe {1D567E6A-790C-49bd-BA08-5716F1936519}.exe File created C:\Windows\{5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe {65875551-BE58-48c0-BE21-0D5034807F34}.exe File created C:\Windows\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe File created C:\Windows\{43DED986-3F40-4374-AFB0-387801380D3D}.exe {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1D567E6A-790C-49bd-BA08-5716F1936519}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {65875551-BE58-48c0-BE21-0D5034807F34}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {43DED986-3F40-4374-AFB0-387801380D3D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {796ACE98-4E4A-4ecd-861A-13698F015827}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe Token: SeIncBasePriorityPrivilege 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe Token: SeIncBasePriorityPrivilege 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe Token: SeIncBasePriorityPrivilege 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe Token: SeIncBasePriorityPrivilege 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe Token: SeIncBasePriorityPrivilege 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe Token: SeIncBasePriorityPrivilege 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe Token: SeIncBasePriorityPrivilege 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe Token: SeIncBasePriorityPrivilege 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe Token: SeIncBasePriorityPrivilege 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe Token: SeIncBasePriorityPrivilege 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe Token: SeIncBasePriorityPrivilege 1100 {0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3548 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 89 PID 2300 wrote to memory of 3548 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 89 PID 2300 wrote to memory of 3548 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 89 PID 2300 wrote to memory of 4948 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 90 PID 2300 wrote to memory of 4948 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 90 PID 2300 wrote to memory of 4948 2300 2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe 90 PID 3548 wrote to memory of 396 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 91 PID 3548 wrote to memory of 396 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 91 PID 3548 wrote to memory of 396 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 91 PID 3548 wrote to memory of 3956 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 92 PID 3548 wrote to memory of 3956 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 92 PID 3548 wrote to memory of 3956 3548 {B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe 92 PID 396 wrote to memory of 5012 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 95 PID 396 wrote to memory of 5012 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 95 PID 396 wrote to memory of 5012 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 95 PID 396 wrote to memory of 4732 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 96 PID 396 wrote to memory of 4732 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 96 PID 396 wrote to memory of 4732 396 {1D567E6A-790C-49bd-BA08-5716F1936519}.exe 96 PID 5012 wrote to memory of 1416 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 97 PID 5012 wrote to memory of 1416 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 97 PID 5012 wrote to memory of 1416 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 97 PID 5012 wrote to memory of 2580 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 98 PID 5012 wrote to memory of 2580 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 98 PID 5012 wrote to memory of 2580 5012 {796ACE98-4E4A-4ecd-861A-13698F015827}.exe 98 PID 1416 wrote to memory of 4236 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 99 PID 1416 wrote to memory of 4236 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 99 PID 1416 wrote to memory of 4236 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 99 PID 1416 wrote to memory of 3640 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 100 PID 1416 wrote to memory of 3640 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 100 PID 1416 wrote to memory of 3640 1416 {0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe 100 PID 4236 wrote to memory of 1644 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 101 PID 4236 wrote to memory of 1644 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 101 PID 4236 wrote to memory of 1644 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 101 PID 4236 wrote to memory of 1140 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 102 PID 4236 wrote to memory of 1140 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 102 PID 4236 wrote to memory of 1140 4236 {65875551-BE58-48c0-BE21-0D5034807F34}.exe 102 PID 1644 wrote to memory of 3200 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 103 PID 1644 wrote to memory of 3200 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 103 PID 1644 wrote to memory of 3200 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 103 PID 1644 wrote to memory of 4288 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 104 PID 1644 wrote to memory of 4288 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 104 PID 1644 wrote to memory of 4288 1644 {5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe 104 PID 3200 wrote to memory of 3328 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 105 PID 3200 wrote to memory of 3328 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 105 PID 3200 wrote to memory of 3328 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 105 PID 3200 wrote to memory of 3912 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 106 PID 3200 wrote to memory of 3912 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 106 PID 3200 wrote to memory of 3912 3200 {CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe 106 PID 3328 wrote to memory of 3016 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 107 PID 3328 wrote to memory of 3016 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 107 PID 3328 wrote to memory of 3016 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 107 PID 3328 wrote to memory of 1056 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 108 PID 3328 wrote to memory of 1056 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 108 PID 3328 wrote to memory of 1056 3328 {43DED986-3F40-4374-AFB0-387801380D3D}.exe 108 PID 3016 wrote to memory of 2012 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 109 PID 3016 wrote to memory of 2012 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 109 PID 3016 wrote to memory of 2012 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 109 PID 3016 wrote to memory of 4588 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 110 PID 3016 wrote to memory of 4588 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 110 PID 3016 wrote to memory of 4588 3016 {454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe 110 PID 2012 wrote to memory of 1100 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe 111 PID 2012 wrote to memory of 1100 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe 111 PID 2012 wrote to memory of 1100 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe 111 PID 2012 wrote to memory of 812 2012 {00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-29_56542454145bd6940ff909166b00a7da_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exeC:\Windows\{B1B0C913-EE87-4faf-BC48-0E9966DE6C1B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\{1D567E6A-790C-49bd-BA08-5716F1936519}.exeC:\Windows\{1D567E6A-790C-49bd-BA08-5716F1936519}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\{796ACE98-4E4A-4ecd-861A-13698F015827}.exeC:\Windows\{796ACE98-4E4A-4ecd-861A-13698F015827}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\{0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exeC:\Windows\{0F904E7B-85EA-458e-8A56-317F7A8CB31A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\{65875551-BE58-48c0-BE21-0D5034807F34}.exeC:\Windows\{65875551-BE58-48c0-BE21-0D5034807F34}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\{5F577E50-3A50-4542-9C24-B3B841C5E10D}.exeC:\Windows\{5F577E50-3A50-4542-9C24-B3B841C5E10D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exeC:\Windows\{CB1C3B9B-2913-4b9d-8670-E8F4CD7D7CF0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\{43DED986-3F40-4374-AFB0-387801380D3D}.exeC:\Windows\{43DED986-3F40-4374-AFB0-387801380D3D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\{454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exeC:\Windows\{454651D0-E252-4067-BBB0-D1F30DE0E7FF}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exeC:\Windows\{00C2F592-A342-483d-8922-AD4CD5C1D1A3}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exeC:\Windows\{0021A4CD-537A-488c-A8FF-9FC7C4B967CF}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exeC:\Windows\{7DFEDDA7-5EE8-4549-A6F8-379DD03653FC}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0021A~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00C2F~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{45465~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{43DED~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB1C3~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5F577~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65875~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F904~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{796AC~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D567~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1B0C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD53663f6df385dfe7e63a75734ae7fb3c1
SHA137e151743c277485d302c4c7a9c237c262d56a8e
SHA2566fa490c6a7173fb5bc2bdbbfac20b0945df9a0001b6513e49256e62f3f6eb62f
SHA512e3daffdba33e1ee27fadc913c1a51690f5e560ee6777c6ff45089cdee8c640e4d8ac4e8b28d9811db27b8948bfb56adeb77e971a749481c92e7b8261b65b8bb5
-
Filesize
204KB
MD5da82199f9ff9b1292b6df1232ae0f3df
SHA1a4efea7e4b362f6a5a5057ffb610e80101ad2f10
SHA25609d0cc1e58f1183803b8262a8cb6ad6adfa1c1b0f2cc9c1f071de99bfab3b300
SHA512e9206f7596e9d2ed62021084d3be7fec496a8584b295c8cd41cac7f2b806f90dd4d28697156042d001a258eea1bb2b6a14b4b854eec3ccb24569cffe3be9545d
-
Filesize
204KB
MD54a9ad52900cd61feeb25d34ba422ab75
SHA19ac5f966ea66f31c595d4a330fdd9d9afaa2af12
SHA256f811946cc3c8fcfc93f5ffb0f707f4eeaaed1d25ee7929ed0c2b5276f36fdb39
SHA512c624f0ac2389793b4fe8b4086c6df8c0c940a165dc8b14d217cf8f103b8d437f020848b0bb10948de74a4130eca449b4f06dc7f12b8b8f87bb2cbd5b17091318
-
Filesize
204KB
MD56f0dcb802d837f09b858de3c9505773c
SHA1c931f8800e125291dc5f67b47192b0ae5eb8fb5a
SHA2569dd9053490c047b7a39742f69fb982dc85ea4d79c56444b395c968154f6a840a
SHA512eedfed081a76b9abbedfeecf13320f78486fdb1214e41f47a128bb0a31957025543750f66cdae02c17433365df6f6ee50d9c00f9ba681e9b4a38bac1dcd2aa1f
-
Filesize
204KB
MD5e2ae400acb0307e15785d04bdf8ccf3e
SHA16f8bb4e65b27d9bf57656067c31e7edb7a4718a5
SHA2564581015e105d73bc5c78437e8590afdaeb7cb6fc9588f2c6321245cbcb00a9c8
SHA512a4ea9bd13ad5a015d47762f9cb1ee238678c561cef0ad9182ece5992bd0b23dca68a9041f7e2b36e2659f1814a9727239291d1aaf19a56dd9c6abff259d05f6f
-
Filesize
204KB
MD57288ef62baf0d971ab67541b582f1438
SHA1c850e66399970d33dc1f8152a4f8e49cb537fb7b
SHA256176245ec0b92477a71948337cb8738367e707f39737f149527756170f7dc926c
SHA512c35e39ee400b473a80aa3e9dfd3bf10cbe2b086bd26375561d676951ce4cff8901944bdf5151a1e6b7bd470229e4c9cf39ac45e14f2eee80cde6b43fde7dd838
-
Filesize
204KB
MD502b74cdeb5c88d737116fe9be27e1856
SHA1856a751e26472ff9aea41a985c454146e4b650b3
SHA2565f1fe6d2057ed3233a28adb2ae44add9fc4b6286dba350987f4ab4bc7602e694
SHA512b2e880e9278e09e0be89db57557566fe154cde8ca727076d098d291972fd9cda14339dd7887ae4ded99de045f5f0af8175aeeb90ad9eab659277c470810daeaf
-
Filesize
204KB
MD5497eea26ba8055801bc9ea72833b382d
SHA1df301910a0ace436690e2783abad2b27d9e07b82
SHA256bebd6710959877ccf56eefb6f45843efa9e2495fcbc48d31de96dc2a651627fe
SHA512b936b2746f91a9261f39725573a1f8faed951a905f4ad0c574e802564713712d5f6a9720e6128e8668f710aef4be91299bf7e7bf7f7fd10f38c4864b01fa891c
-
Filesize
204KB
MD5534b9a6150463ea23103fd59a97706a3
SHA134c4aa867528e3a93e06e77a7dc8fc01d2dd7db4
SHA256184afe2f7a88aebe3ee65897b540ef77220df0ca754469ab2388a6234f168ef2
SHA512fea373ed5a961aebcf95decd95c06384260b63a35f31022faf4024157c1915caba2441d1f606419ab3b80edeb80207841853311329d411a296829a0962299557
-
Filesize
204KB
MD5aa66c55b48b819e76e5996cafc2d93ce
SHA14d21f33795f211c0774bc3a034c4873d20830626
SHA256fe7530191f7531ad58425fb8d756e598f0c940019478e859629e94649d538ccd
SHA512681ea7b78b97b3be31dae4a836a96f17ec89add28a4a6f0727d07de136aeae0de59c677939896ad8e57eba9737682394e4b3beb919e9b40a04fb616c76c87f43
-
Filesize
204KB
MD5c4bed2abc6af686e49c803ce75c701b9
SHA17d7e009112bbbdeb49075de07c446284d966f1a3
SHA25686ca9aa6f754be48fee1d09ce683dcca90afdcb8a5b9e8253676c25c876a10af
SHA512ca9e8e17a5826dc4f32ede3e90958c981f4c22b76da17f591cbbfcc4fdac12fc9cb1667f74643a92124088c98daa8fe240851db6a434b0335ce12296ca397150
-
Filesize
204KB
MD509d54fd86e46d5a1673bbf4f89a77193
SHA1c8403585bfc0f5fa932427471c250f22c1a736ca
SHA256ea62b9a7e3b9fe1bc7bddac5436956c119a96af922bb05377886314ea9308d51
SHA5128e3db21588ba24d2dfadd6a3ba375771fccf94b6761168d408c86dbf10a230251696a61dd845bca7e7cae4e2c9cdb1ac8eb84be81b4b711cd972a5ca4126c620