Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe
-
Size
372KB
-
MD5
14b6b14a4638fd2a041364710e48cfd0
-
SHA1
43430afa6bc2db36cca902c7613ffca3151ef903
-
SHA256
feff2466a92f4bb5cb464c9906cee2bbd40439c202c0c6b0c51fd03aa6b1e4dd
-
SHA512
925de9f30829e8eb82a4d227bce8a991b22749daa24e0275ffa66db6951da87b21ce878dd254ae41eadc3815d9ab4dea5aa3844a7693778100af30ec8a109cb7
-
SSDEEP
3072:CEGh0oHlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGRlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0831A82-667E-405b-A83B-83824FD5CB2A}\stubpath = "C:\\Windows\\{E0831A82-667E-405b-A83B-83824FD5CB2A}.exe" {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}\stubpath = "C:\\Windows\\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe" {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A9C8098-72AF-40c3-B353-3FA68957E94A} {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0A9C8098-72AF-40c3-B353-3FA68957E94A}\stubpath = "C:\\Windows\\{0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe" {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B} {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A99BC8BA-73C9-4c35-BDD6-34D01362832F}\stubpath = "C:\\Windows\\{A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe" 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79C2310D-7019-41f5-8ABF-16B4A4A1310B} {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A8CC29F-737B-4909-A692-93D1A4B1B750}\stubpath = "C:\\Windows\\{6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe" {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{832025AC-B775-4e2f-B059-BEAD309DCA32}\stubpath = "C:\\Windows\\{832025AC-B775-4e2f-B059-BEAD309DCA32}.exe" {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{18A8CA31-DD02-4726-9C2C-78566ADF6083} {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EA086FD-7537-4fc0-B12B-2F074E6780EA} {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A99BC8BA-73C9-4c35-BDD6-34D01362832F} 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E3885671-558F-4662-B1E1-E9B13F7D4B37} {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E3885671-558F-4662-B1E1-E9B13F7D4B37}\stubpath = "C:\\Windows\\{E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe" {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79C2310D-7019-41f5-8ABF-16B4A4A1310B}\stubpath = "C:\\Windows\\{79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe" {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17} {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5EA086FD-7537-4fc0-B12B-2F074E6780EA}\stubpath = "C:\\Windows\\{5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exe" {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E0831A82-667E-405b-A83B-83824FD5CB2A} {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A8CC29F-737B-4909-A692-93D1A4B1B750} {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{832025AC-B775-4e2f-B059-BEAD309DCA32} {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{18A8CA31-DD02-4726-9C2C-78566ADF6083}\stubpath = "C:\\Windows\\{18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe" {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}\stubpath = "C:\\Windows\\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe" {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe -
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 1708 {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe 1788 {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe 2400 {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe 2292 {5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe File created C:\Windows\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe File created C:\Windows\{0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe File created C:\Windows\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe File created C:\Windows\{5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exe {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe File created C:\Windows\{A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe File created C:\Windows\{E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe File created C:\Windows\{79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe File created C:\Windows\{832025AC-B775-4e2f-B059-BEAD309DCA32}.exe {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe File created C:\Windows\{18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe File created C:\Windows\{E0831A82-667E-405b-A83B-83824FD5CB2A}.exe {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe Token: SeIncBasePriorityPrivilege 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe Token: SeIncBasePriorityPrivilege 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe Token: SeIncBasePriorityPrivilege 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe Token: SeIncBasePriorityPrivilege 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe Token: SeIncBasePriorityPrivilege 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe Token: SeIncBasePriorityPrivilege 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe Token: SeIncBasePriorityPrivilege 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe Token: SeIncBasePriorityPrivilege 1708 {67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe Token: SeIncBasePriorityPrivilege 1788 {0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe Token: SeIncBasePriorityPrivilege 2400 {F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 544 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 31 PID 1676 wrote to memory of 544 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 31 PID 1676 wrote to memory of 544 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 31 PID 1676 wrote to memory of 544 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 31 PID 1676 wrote to memory of 1124 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 32 PID 1676 wrote to memory of 1124 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 32 PID 1676 wrote to memory of 1124 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 32 PID 1676 wrote to memory of 1124 1676 2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe 32 PID 544 wrote to memory of 2708 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 33 PID 544 wrote to memory of 2708 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 33 PID 544 wrote to memory of 2708 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 33 PID 544 wrote to memory of 2708 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 33 PID 544 wrote to memory of 2824 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 34 PID 544 wrote to memory of 2824 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 34 PID 544 wrote to memory of 2824 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 34 PID 544 wrote to memory of 2824 544 {A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe 34 PID 2708 wrote to memory of 2132 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 35 PID 2708 wrote to memory of 2132 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 35 PID 2708 wrote to memory of 2132 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 35 PID 2708 wrote to memory of 2132 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 35 PID 2708 wrote to memory of 2816 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 36 PID 2708 wrote to memory of 2816 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 36 PID 2708 wrote to memory of 2816 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 36 PID 2708 wrote to memory of 2816 2708 {E0831A82-667E-405b-A83B-83824FD5CB2A}.exe 36 PID 2132 wrote to memory of 2648 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 37 PID 2132 wrote to memory of 2648 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 37 PID 2132 wrote to memory of 2648 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 37 PID 2132 wrote to memory of 2648 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 37 PID 2132 wrote to memory of 2776 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 38 PID 2132 wrote to memory of 2776 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 38 PID 2132 wrote to memory of 2776 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 38 PID 2132 wrote to memory of 2776 2132 {E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe 38 PID 2648 wrote to memory of 2772 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 39 PID 2648 wrote to memory of 2772 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 39 PID 2648 wrote to memory of 2772 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 39 PID 2648 wrote to memory of 2772 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 39 PID 2648 wrote to memory of 2652 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 40 PID 2648 wrote to memory of 2652 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 40 PID 2648 wrote to memory of 2652 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 40 PID 2648 wrote to memory of 2652 2648 {79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe 40 PID 2772 wrote to memory of 2024 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 41 PID 2772 wrote to memory of 2024 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 41 PID 2772 wrote to memory of 2024 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 41 PID 2772 wrote to memory of 2024 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 41 PID 2772 wrote to memory of 2856 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 42 PID 2772 wrote to memory of 2856 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 42 PID 2772 wrote to memory of 2856 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 42 PID 2772 wrote to memory of 2856 2772 {6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe 42 PID 2024 wrote to memory of 1896 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 43 PID 2024 wrote to memory of 1896 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 43 PID 2024 wrote to memory of 1896 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 43 PID 2024 wrote to memory of 1896 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 43 PID 2024 wrote to memory of 2004 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 44 PID 2024 wrote to memory of 2004 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 44 PID 2024 wrote to memory of 2004 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 44 PID 2024 wrote to memory of 2004 2024 {832025AC-B775-4e2f-B059-BEAD309DCA32}.exe 44 PID 1896 wrote to memory of 1708 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 45 PID 1896 wrote to memory of 1708 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 45 PID 1896 wrote to memory of 1708 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 45 PID 1896 wrote to memory of 1708 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 45 PID 1896 wrote to memory of 1312 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 46 PID 1896 wrote to memory of 1312 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 46 PID 1896 wrote to memory of 1312 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 46 PID 1896 wrote to memory of 1312 1896 {18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_14b6b14a4638fd2a041364710e48cfd0_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\{A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exeC:\Windows\{A99BC8BA-73C9-4c35-BDD6-34D01362832F}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\{E0831A82-667E-405b-A83B-83824FD5CB2A}.exeC:\Windows\{E0831A82-667E-405b-A83B-83824FD5CB2A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{E3885671-558F-4662-B1E1-E9B13F7D4B37}.exeC:\Windows\{E3885671-558F-4662-B1E1-E9B13F7D4B37}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\{79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exeC:\Windows\{79C2310D-7019-41f5-8ABF-16B4A4A1310B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\{6A8CC29F-737B-4909-A692-93D1A4B1B750}.exeC:\Windows\{6A8CC29F-737B-4909-A692-93D1A4B1B750}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{832025AC-B775-4e2f-B059-BEAD309DCA32}.exeC:\Windows\{832025AC-B775-4e2f-B059-BEAD309DCA32}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\{18A8CA31-DD02-4726-9C2C-78566ADF6083}.exeC:\Windows\{18A8CA31-DD02-4726-9C2C-78566ADF6083}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exeC:\Windows\{67EE00E8-009B-41cd-9AE7-D3D0F39C3F17}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\{0A9C8098-72AF-40c3-B353-3FA68957E94A}.exeC:\Windows\{0A9C8098-72AF-40c3-B353-3FA68957E94A}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exeC:\Windows\{F02D62B3-935F-4c56-B165-8A9F4E1FBE3B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2400 -
C:\Windows\{5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exeC:\Windows\{5EA086FD-7537-4fc0-B12B-2F074E6780EA}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F02D6~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A9C8~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67EE0~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{18A8C~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83202~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A8CC~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79C23~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3885~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E0831~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A99BC~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD508dd673094e01365646f42094b3a0967
SHA1568adbbdee30b01539d8b2d5b8b26be930981a51
SHA2569a8f938da9d030004cc4ed3158fec1281eee43dcf6fea054e5f9fdaf2bf14ed8
SHA512b9e159fe1de6bbf971b396fd78ae20372a4a4af1ced0a46ec236325275143c48d2bfffca6ba4f719f575b3cf369d7d79ec181ef0c6cd4a9c1e799f9ae2d648b9
-
Filesize
372KB
MD50399e4f3f4239906ffbdf9461ca1862e
SHA1d8d8f0eab8956877abece3dbfb5559d279d4fc69
SHA25665a8e04678181c147ce186d2e7c7f67da478b2fc74ce211ad08a16e535cbe9df
SHA5126848247bd7ba6be9c77cd149ecd706cf47b6dc33d5c522146d50623a2e72440906a6ad8ac4027a1e1a477614e8fa8120e8f401ce97a2485397fc37bcccbc648b
-
Filesize
372KB
MD57581918e7aa8d8ed0cd2e311eb843379
SHA1d882a2ebff04068ec698fdeb48a3ced93bfcaa3f
SHA2560691fb44b0a730e2cec9a6d647bf684d263f6a1baf11aae2d3bf280fbde287a9
SHA512e0e7ce5be4c72120671e55f701532ca59d77363f4c9b626439d8640915f2eace98f1f7c129101e5b97cb52562889f1ff216e09e72ef2ac7290c8f0c0ac4010c4
-
Filesize
372KB
MD5948904f3c5ebefdecb741c11daa55fbe
SHA1c053d1c52d1cf7359a2f88cff252dd6e7d88c05f
SHA256a171a21b7327d91d8b253de5286895b67254a64da89e6baf9162212ccf3a387d
SHA5129ef08640550992831d8d9cca775dc0728024ba7c7c3716bb732281e9a291663c1a0b69f671b2b7db1b528136c86a454dba56a5a82655e82ebf9b8a570e2e8f0d
-
Filesize
372KB
MD5aed853dc7c5275f7267076305400d7d4
SHA1af9e528e982073a951c8525d27ce41820f137412
SHA25677517ca10f0be031712d950461a7cc0c09298a9b458b07a323f3ba626864afa3
SHA512109f15acfd418b75a40b97a14e6a336ef0208e3516de61ecd9798707dd21e1c157aa50ca9d875d4e70ad6beba660286e0bbc03446540f9153fc8a4661238e06d
-
Filesize
372KB
MD537d36ec02c9d3db7da7f52080ebca4a9
SHA1b3d78e854ab3f7e84627f7e844efb64191b64593
SHA256c77123e3738415ac1d9d51083a2b1236682cd9d9fcdbf3538ad80f6d7bec5397
SHA512c3297ecf5af47b12137559c191d0034547f7cd1b25a95fccb6c54deb622e43792d1533af25e93fb7d31cf59762e05aea9ad07a0b6d2829c9f2bf09657b41838f
-
Filesize
372KB
MD5f45557d8add6fefcdda9f3f4354c5600
SHA1180d96dc4cf74d2f2b1115363e6b1175077398cb
SHA256737d20c862171a139521f89fd5d67fa3029c7f376280b927f034eaf4497321d2
SHA512a2057ea65e87c2b51720c67a148e655f7b8610f19d7ef8b949c6ee37872107c15f823cfa05dea55e6baf8d4766483a204b2a851700881e6d4eb1eb7d95184810
-
Filesize
372KB
MD56458140af1557182636f4ba5d436d1e8
SHA1d40e59d0f628368780fa89ab7a191093d3a4133e
SHA2563a52f16944f281419e374d84d1ea634aa9b1b96498dccc16fc6a2a565b870342
SHA512bd7142eee988dc5014048c492ed148a4ed02c972dd3ba47078989be6e0066e82f4522011036059ee804b320838b3956b67bdafc7f8b75793bad4294c0b9a6772
-
Filesize
372KB
MD5f71ac2f0dec3d3259d4055388097c769
SHA14100c04854158fd976fd91acc76e1c799b567cb9
SHA2567fcc694ac85e999ed224e7af78ad4e250f4416aa8ca4dc6742f30bf6fa094b8c
SHA5124711fb6f19d5a2f6d5d6f28ecfaf0f13e65936abe75d00c14ed8f77bf02f7beff7b9b104ae138f58c6c8bbf41a1f726a7bdf268ceb4a7340c8f046f2f7da0910
-
Filesize
372KB
MD5399466c77b4aad0271ab536ef1dbef07
SHA1c2b90807447c16cbccf4f60a659b7a737cf20be6
SHA2562c93efdcbea31691385dfb5f31afdf6922c8fddf4154f36e0addfd93d86f2c8d
SHA51284d09acdef95dd677789d119df09e87eea8cc9bdab8aed7274de9641f49bee011e2c4167e215f13277f2b4c1be70a3bc199476c9e8b7dece04fb2f46dfe70ba0
-
Filesize
372KB
MD59f9ded61167b6bc7fc960a169755e2c2
SHA1aec9f2cf72c390e276e4366e268420c5fd486614
SHA25649d97b6397fa2f44e4815cdb6d4737e1c6e422f1d52f3d14a20d4c7d8028b8f1
SHA5124d203afb0440b22903ee26a2406091d7901b7240769920beabeee93db70b6751099207c72b1e04ead39ee309305829a6fedb29fd4925b4a276c4867c3dfb4288