Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe
-
Size
180KB
-
MD5
c96f3f07da3e5552934c819a507d2f7b
-
SHA1
b35d1bac83b6d42dadc4f6e08496a101126e9d6c
-
SHA256
7cb6e5e2475ca67435cff45fa3cbd19944070343d154f5675cca2b5982b1c8ef
-
SHA512
cc5b5a08e9fda2111530c0b2ef8a003b3b942036853926c0b011c8ab9eba02b755427137c73e919cf27c084bfefdc45f7766cd5a972f3ce151e9a416c9c4cca4
-
SSDEEP
3072:jEGh0oMlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGul5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E44AC53-4777-460c-B190-B295515C44D2} {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E44AC53-4777-460c-B190-B295515C44D2}\stubpath = "C:\\Windows\\{7E44AC53-4777-460c-B190-B295515C44D2}.exe" {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA} {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E162564A-DE4D-436b-9D96-D4D2D0640913} {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E162564A-DE4D-436b-9D96-D4D2D0640913}\stubpath = "C:\\Windows\\{E162564A-DE4D-436b-9D96-D4D2D0640913}.exe" {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5}\stubpath = "C:\\Windows\\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe" {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A348C4-1B6E-4734-8D38-72CCEA8E510D}\stubpath = "C:\\Windows\\{03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe" {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5EECF65B-0DBF-4105-A288-AB325E80451A} {4F77675F-0573-46ea-B098-68C194286324}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5EECF65B-0DBF-4105-A288-AB325E80451A}\stubpath = "C:\\Windows\\{5EECF65B-0DBF-4105-A288-AB325E80451A}.exe" {4F77675F-0573-46ea-B098-68C194286324}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B} {7E44AC53-4777-460c-B190-B295515C44D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200} {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9572BED8-237A-4d4f-982D-F2CD965C0D59} 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9572BED8-237A-4d4f-982D-F2CD965C0D59}\stubpath = "C:\\Windows\\{9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe" 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03A348C4-1B6E-4734-8D38-72CCEA8E510D} {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}\stubpath = "C:\\Windows\\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe" {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5} {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5}\stubpath = "C:\\Windows\\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exe" {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F77675F-0573-46ea-B098-68C194286324} {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}\stubpath = "C:\\Windows\\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe" {7E44AC53-4777-460c-B190-B295515C44D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{231C6556-B90E-4cfb-A4AD-765785A4B5B8}\stubpath = "C:\\Windows\\{231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe" {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}\stubpath = "C:\\Windows\\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe" {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F77675F-0573-46ea-B098-68C194286324}\stubpath = "C:\\Windows\\{4F77675F-0573-46ea-B098-68C194286324}.exe" {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5} {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{231C6556-B90E-4cfb-A4AD-765785A4B5B8} {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe -
Executes dropped EXE 12 IoCs
pid Process 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe 3456 {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe 3648 {35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exe {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe File created C:\Windows\{5EECF65B-0DBF-4105-A288-AB325E80451A}.exe {4F77675F-0573-46ea-B098-68C194286324}.exe File created C:\Windows\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe File created C:\Windows\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe {7E44AC53-4777-460c-B190-B295515C44D2}.exe File created C:\Windows\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe File created C:\Windows\{231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe File created C:\Windows\{7E44AC53-4777-460c-B190-B295515C44D2}.exe {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe File created C:\Windows\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe File created C:\Windows\{9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe File created C:\Windows\{03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe File created C:\Windows\{4F77675F-0573-46ea-B098-68C194286324}.exe {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe File created C:\Windows\{E162564A-DE4D-436b-9D96-D4D2D0640913}.exe {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4F77675F-0573-46ea-B098-68C194286324}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E44AC53-4777-460c-B190-B295515C44D2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe Token: SeIncBasePriorityPrivilege 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe Token: SeIncBasePriorityPrivilege 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe Token: SeIncBasePriorityPrivilege 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe Token: SeIncBasePriorityPrivilege 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe Token: SeIncBasePriorityPrivilege 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe Token: SeIncBasePriorityPrivilege 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe Token: SeIncBasePriorityPrivilege 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe Token: SeIncBasePriorityPrivilege 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe Token: SeIncBasePriorityPrivilege 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe Token: SeIncBasePriorityPrivilege 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe Token: SeIncBasePriorityPrivilege 3456 {A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2888 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 88 PID 1196 wrote to memory of 2888 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 88 PID 1196 wrote to memory of 2888 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 88 PID 1196 wrote to memory of 5012 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 89 PID 1196 wrote to memory of 5012 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 89 PID 1196 wrote to memory of 5012 1196 2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe 89 PID 2888 wrote to memory of 4732 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 93 PID 2888 wrote to memory of 4732 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 93 PID 2888 wrote to memory of 4732 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 93 PID 2888 wrote to memory of 1040 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 94 PID 2888 wrote to memory of 1040 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 94 PID 2888 wrote to memory of 1040 2888 {9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe 94 PID 4732 wrote to memory of 3688 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 97 PID 4732 wrote to memory of 3688 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 97 PID 4732 wrote to memory of 3688 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 97 PID 4732 wrote to memory of 4708 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 98 PID 4732 wrote to memory of 4708 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 98 PID 4732 wrote to memory of 4708 4732 {03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe 98 PID 3688 wrote to memory of 4472 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 99 PID 3688 wrote to memory of 4472 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 99 PID 3688 wrote to memory of 4472 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 99 PID 3688 wrote to memory of 4144 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 100 PID 3688 wrote to memory of 4144 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 100 PID 3688 wrote to memory of 4144 3688 {4F77675F-0573-46ea-B098-68C194286324}.exe 100 PID 4472 wrote to memory of 448 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 101 PID 4472 wrote to memory of 448 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 101 PID 4472 wrote to memory of 448 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 101 PID 4472 wrote to memory of 1716 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 102 PID 4472 wrote to memory of 1716 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 102 PID 4472 wrote to memory of 1716 4472 {5EECF65B-0DBF-4105-A288-AB325E80451A}.exe 102 PID 448 wrote to memory of 1276 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 103 PID 448 wrote to memory of 1276 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 103 PID 448 wrote to memory of 1276 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 103 PID 448 wrote to memory of 5072 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 104 PID 448 wrote to memory of 5072 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 104 PID 448 wrote to memory of 5072 448 {E162564A-DE4D-436b-9D96-D4D2D0640913}.exe 104 PID 1276 wrote to memory of 5112 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 105 PID 1276 wrote to memory of 5112 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 105 PID 1276 wrote to memory of 5112 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 105 PID 1276 wrote to memory of 2516 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 106 PID 1276 wrote to memory of 2516 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 106 PID 1276 wrote to memory of 2516 1276 {34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe 106 PID 5112 wrote to memory of 2412 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 107 PID 5112 wrote to memory of 2412 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 107 PID 5112 wrote to memory of 2412 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 107 PID 5112 wrote to memory of 3516 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 108 PID 5112 wrote to memory of 3516 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 108 PID 5112 wrote to memory of 3516 5112 {231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe 108 PID 2412 wrote to memory of 3680 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 109 PID 2412 wrote to memory of 3680 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 109 PID 2412 wrote to memory of 3680 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 109 PID 2412 wrote to memory of 3528 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 110 PID 2412 wrote to memory of 3528 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 110 PID 2412 wrote to memory of 3528 2412 {7E44AC53-4777-460c-B190-B295515C44D2}.exe 110 PID 3680 wrote to memory of 916 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 111 PID 3680 wrote to memory of 916 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 111 PID 3680 wrote to memory of 916 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 111 PID 3680 wrote to memory of 5036 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 112 PID 3680 wrote to memory of 5036 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 112 PID 3680 wrote to memory of 5036 3680 {3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe 112 PID 916 wrote to memory of 3456 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe 113 PID 916 wrote to memory of 3456 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe 113 PID 916 wrote to memory of 3456 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe 113 PID 916 wrote to memory of 884 916 {B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-30_c96f3f07da3e5552934c819a507d2f7b_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\{9572BED8-237A-4d4f-982D-F2CD965C0D59}.exeC:\Windows\{9572BED8-237A-4d4f-982D-F2CD965C0D59}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\{03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exeC:\Windows\{03A348C4-1B6E-4734-8D38-72CCEA8E510D}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\{4F77675F-0573-46ea-B098-68C194286324}.exeC:\Windows\{4F77675F-0573-46ea-B098-68C194286324}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\{5EECF65B-0DBF-4105-A288-AB325E80451A}.exeC:\Windows\{5EECF65B-0DBF-4105-A288-AB325E80451A}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\{E162564A-DE4D-436b-9D96-D4D2D0640913}.exeC:\Windows\{E162564A-DE4D-436b-9D96-D4D2D0640913}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exeC:\Windows\{34ED890C-89A2-4d0e-9D50-6B3D484AECC5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\{231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exeC:\Windows\{231C6556-B90E-4cfb-A4AD-765785A4B5B8}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\{7E44AC53-4777-460c-B190-B295515C44D2}.exeC:\Windows\{7E44AC53-4777-460c-B190-B295515C44D2}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exeC:\Windows\{3C5494CF-87EE-4af8-A8FF-0B34479B5F4B}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exeC:\Windows\{B01FEBE7-F3CC-4402-9255-9FE7CB6DC200}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exeC:\Windows\{A4878A1A-BBDA-4714-B1C8-D5F4F18AFECA}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exeC:\Windows\{35ADD432-C72C-49ee-83FF-C7AC223AD7A5}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4878~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B01FE~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C549~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E44A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{231C6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34ED8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1625~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5EECF~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F776~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03A34~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9572B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5cd77ac339a22c66ba022340ae92218e2
SHA1a782a47c41286409dd3743d9f37f86030d1b4d80
SHA2563abf055b9a0e4972148b23e36840b58ead4d654aa00ad8f028dbc2541f50b5f9
SHA51294f3eb1593835aa629573ac9fba17cb463b2069413272cc31e1dce56794a60eea967ba80b1a94a6ca4cfb6ee16a69ca6a1f4277f890d03c02a3ab3dc8d406147
-
Filesize
180KB
MD55c7d76161ba7df6fed77f5f90c3bdc16
SHA1af6a6f76408fde30a2b9c08344032f5d9f895f55
SHA25675ee2e58aa4402f3ca9c45ac0b4074f843f1457868761fe42113a62b55582938
SHA512d196e23d1e0e75ae6ccf98bcf6a410d814e1dd17a8c78341c46b78364fd0feb88098138cdc8b1f1e9284b8fe2a27910fbe078e1867789157da24925e745ed493
-
Filesize
180KB
MD57802bee9f77d9945cf52f115c70b115f
SHA12b675459a3692d5feebcdce4589de06481debf50
SHA2568f5df7ebfdfc54d667b1b5513f49973d60902f2bd9a1ad52c69c0992eae54c53
SHA5121801dd847dc4ed8cd3349c415e1ce740eed56490a3ec96779d6f48247a80c38de0ae76a9025cac413efb4d3bda31d6efee4ac922a6a032b19cd9a0b2d325f1a4
-
Filesize
180KB
MD51cd6b8331a1cfa6b19786846b24fc858
SHA1c3e5002d07718580c251c8b36d9a7e06b99d6e77
SHA25639f9a6597a94bb0f5a006056ef607e9a678b8a8b7778c8ab530abd764daeb6ed
SHA512f00df10a76c5c9495fbe3bff64ebeff8597f06dc58ce790fab610880d327fae90efbcd30ce49e3f057b4527b1295706aa1327de44a63c91b38ad52d927f3b153
-
Filesize
180KB
MD56f8f5551f262932b620b382661424cbf
SHA1c2b2f2156e6b7da29efea980519bd3a9dc9204e9
SHA256a5c3224f4285bade1a4e2d828ea9a491d652419705f8389f98c3a48cb9171656
SHA512d0666b4bc40c98cff835daaa10bacad2dfe957cb46aaf035869bf25ca509a44a6631fa069885ba47cb24e7d3ac4d0cebf5a53fa172f844a8b7020226fde5ae4a
-
Filesize
180KB
MD57d77d7f5776b17a10fd7d6f3264e9d82
SHA18c6d40d3f2555ea86db4e68c7eabd41145c7ca82
SHA256cf70152d4130b39b94f1e699344ab131bc6dbbb41fd548a66182b77808985e6a
SHA512a72444e8253b2986fdbb686ff8766b2e66a0d6775ddb85ff2bc485f3907dfc120dfbe302aeab80770342ebdb74df07c50d76e33e2fdb0cecadcef3740fccdc89
-
Filesize
180KB
MD5b81fd448aa73d5ce02601cce803ced98
SHA188110f8918321b5e181ee6d67a7299f145ee2828
SHA2566c1b628473cfe576ef8c4d4bee4ac3083b9272b86da77c45d56edd6bdb03b916
SHA512d5836242ab4426c2efd6960f4b0f4baaa75494fd377797fe6e1323efb3d5c763a7bcca476365025ae5d74a563aef4a9ce07db0293d3a427b61f044a251d3af5a
-
Filesize
180KB
MD5bd4f5113304474e2ae261be0a51e2b54
SHA1dd6b91cff1da77095daac4ba275d438936ec11a8
SHA2562b89d9632dbb6154daee5af0ef81ef647f30ca0399b1aea8db8fa7c8ff0a9ffd
SHA5122d22ea7ff18ca4e927e30c194962e54dcda7ae532d2376948ae52b26ca27f3bd989ac236bdd99e9a4c5eb213c3823f14afee9058794586c681782934597886de
-
Filesize
180KB
MD50fd00772feb482269d84d568ba8799c6
SHA1fc755c363f5f031a333a37305bed5132da31631d
SHA2563db31b1657f68fefbdded43e34708c10c1859f2e6cd40a1c6827a8a1b9cea6f2
SHA512d0b75ac4a30ca8dec60c3e1be7b4082d3d3c4bc951bbbe69947f42cea6f122053f061a09742258a5977ef55beca5facba9c14e9a73b5329c45b466e8dec6b27f
-
Filesize
180KB
MD5132002b407f27584d159742bbd5ead29
SHA1b3aeb8f415a86ff1735594691a4ffb4f1fc09ae6
SHA2568eed5d3a4633ad0152ffd55fa82e5675141b569da92f7b0ae61b8be48e4a909b
SHA512c7b0a090a5159e2d3f82cf440bbf256daeaacec75753998cbd3ba6a08fdb795dc1241b21c4b759118066325a7b61fc965132213bb324986045588fcd78d128c6
-
Filesize
180KB
MD5914ac13cee069fda085b1d6a8f68fe44
SHA188c952745b33e3d801a2dbbc4458dc5d34354ea4
SHA2564595ffac594cd387891531eb638320287445e2293094d3514d5c4236ecda6958
SHA512b24771c7c03a443eec798cebd8da6b5dfe920aafffaa2a226803609ab0704ffa7213ce7ef8530045d4b65783b19e4ed8e45b4af2f218889a915108391665c998
-
Filesize
180KB
MD5fa0744ac456ead1b11c159bf62d76899
SHA127d07a805ccf3d5a0f67b9f62e543e4cd2572c23
SHA25666c29be65d1f827813d92f258bddbd4904e6564bbdc4663274ff0e05462a7878
SHA5128e5bc6c7b7e5dabf025f774d7d4cb94f0b03b6364c1b12201d8336f25d029d327194b536942080a9091b7d93a9f94c252b1c71711faf904db00632b5282f0cd7