Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe
-
Size
180KB
-
MD5
583e131dc564f0999013a64a9650035a
-
SHA1
a8d4d870e0a7906a71d75b23c78ac49be090419c
-
SHA256
556e04cd1a93577543dbe66c07ee8e826f07efcb17e0050d34838e1f7a0e8bb9
-
SHA512
c2f6adc683a5b1573c5184c94ed0083d827b2628386ebe3733534564b5aed4ef6287cdad9aefcd83b0fc6f2b56c517b356d210cf1800f66233d11730f460ab0b
-
SSDEEP
3072:jEGh0oolfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGal5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4} {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{981C7918-8FA3-4763-ADC9-22256ED66A11} {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{981C7918-8FA3-4763-ADC9-22256ED66A11}\stubpath = "C:\\Windows\\{981C7918-8FA3-4763-ADC9-22256ED66A11}.exe" {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{696328C9-4EAD-498d-B40A-DC706F2D8955}\stubpath = "C:\\Windows\\{696328C9-4EAD-498d-B40A-DC706F2D8955}.exe" 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59} {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3DA443C-F2EF-441f-A99D-71D739A4495D} {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3DA443C-F2EF-441f-A99D-71D739A4495D}\stubpath = "C:\\Windows\\{D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe" {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B432F317-4E75-4441-A41C-11975938B6CE}\stubpath = "C:\\Windows\\{B432F317-4E75-4441-A41C-11975938B6CE}.exe" {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}\stubpath = "C:\\Windows\\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe" {B432F317-4E75-4441-A41C-11975938B6CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE}\stubpath = "C:\\Windows\\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe" {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{696328C9-4EAD-498d-B40A-DC706F2D8955} 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2268079-9E50-4692-A3BF-870A720BEC43}\stubpath = "C:\\Windows\\{F2268079-9E50-4692-A3BF-870A720BEC43}.exe" {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EC86697-8C19-46bf-8510-0994BDC272A8} {F2268079-9E50-4692-A3BF-870A720BEC43}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B432F317-4E75-4441-A41C-11975938B6CE} {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE} {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F2268079-9E50-4692-A3BF-870A720BEC43} {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}\stubpath = "C:\\Windows\\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe" {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8} {B432F317-4E75-4441-A41C-11975938B6CE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{671B4BC0-5E21-4075-957E-E61CC33B3EFD}\stubpath = "C:\\Windows\\{671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe" {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{671B4BC0-5E21-4075-957E-E61CC33B3EFD} {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}\stubpath = "C:\\Windows\\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe" {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EC86697-8C19-46bf-8510-0994BDC272A8}\stubpath = "C:\\Windows\\{3EC86697-8C19-46bf-8510-0994BDC272A8}.exe" {F2268079-9E50-4692-A3BF-870A720BEC43}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{476622F9-017B-4044-BBC7-A88D4B1915B3} {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{476622F9-017B-4044-BBC7-A88D4B1915B3}\stubpath = "C:\\Windows\\{476622F9-017B-4044-BBC7-A88D4B1915B3}.exe" {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe -
Executes dropped EXE 12 IoCs
pid Process 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe 3196 {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe 520 {981C7918-8FA3-4763-ADC9-22256ED66A11}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe File created C:\Windows\{981C7918-8FA3-4763-ADC9-22256ED66A11}.exe {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe File created C:\Windows\{696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe File created C:\Windows\{D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe File created C:\Windows\{B432F317-4E75-4441-A41C-11975938B6CE}.exe {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe File created C:\Windows\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe {B432F317-4E75-4441-A41C-11975938B6CE}.exe File created C:\Windows\{476622F9-017B-4044-BBC7-A88D4B1915B3}.exe {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe File created C:\Windows\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe File created C:\Windows\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe File created C:\Windows\{F2268079-9E50-4692-A3BF-870A720BEC43}.exe {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe File created C:\Windows\{3EC86697-8C19-46bf-8510-0994BDC272A8}.exe {F2268079-9E50-4692-A3BF-870A720BEC43}.exe File created C:\Windows\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F2268079-9E50-4692-A3BF-870A720BEC43}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B432F317-4E75-4441-A41C-11975938B6CE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {981C7918-8FA3-4763-ADC9-22256ED66A11}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe Token: SeIncBasePriorityPrivilege 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe Token: SeIncBasePriorityPrivilege 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe Token: SeIncBasePriorityPrivilege 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe Token: SeIncBasePriorityPrivilege 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe Token: SeIncBasePriorityPrivilege 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe Token: SeIncBasePriorityPrivilege 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe Token: SeIncBasePriorityPrivilege 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe Token: SeIncBasePriorityPrivilege 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe Token: SeIncBasePriorityPrivilege 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe Token: SeIncBasePriorityPrivilege 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe Token: SeIncBasePriorityPrivilege 3196 {FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 3152 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 95 PID 1008 wrote to memory of 3152 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 95 PID 1008 wrote to memory of 3152 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 95 PID 1008 wrote to memory of 1528 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 96 PID 1008 wrote to memory of 1528 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 96 PID 1008 wrote to memory of 1528 1008 2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe 96 PID 3152 wrote to memory of 3200 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 99 PID 3152 wrote to memory of 3200 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 99 PID 3152 wrote to memory of 3200 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 99 PID 3152 wrote to memory of 3896 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 100 PID 3152 wrote to memory of 3896 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 100 PID 3152 wrote to memory of 3896 3152 {696328C9-4EAD-498d-B40A-DC706F2D8955}.exe 100 PID 3200 wrote to memory of 3984 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 103 PID 3200 wrote to memory of 3984 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 103 PID 3200 wrote to memory of 3984 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 103 PID 3200 wrote to memory of 3096 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 104 PID 3200 wrote to memory of 3096 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 104 PID 3200 wrote to memory of 3096 3200 {7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe 104 PID 3984 wrote to memory of 4976 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 105 PID 3984 wrote to memory of 4976 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 105 PID 3984 wrote to memory of 4976 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 105 PID 3984 wrote to memory of 5052 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 106 PID 3984 wrote to memory of 5052 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 106 PID 3984 wrote to memory of 5052 3984 {F2268079-9E50-4692-A3BF-870A720BEC43}.exe 106 PID 4976 wrote to memory of 4884 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 107 PID 4976 wrote to memory of 4884 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 107 PID 4976 wrote to memory of 4884 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 107 PID 4976 wrote to memory of 3040 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 108 PID 4976 wrote to memory of 3040 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 108 PID 4976 wrote to memory of 3040 4976 {3EC86697-8C19-46bf-8510-0994BDC272A8}.exe 108 PID 4884 wrote to memory of 4012 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 109 PID 4884 wrote to memory of 4012 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 109 PID 4884 wrote to memory of 4012 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 109 PID 4884 wrote to memory of 3144 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 110 PID 4884 wrote to memory of 3144 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 110 PID 4884 wrote to memory of 3144 4884 {D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe 110 PID 4012 wrote to memory of 4368 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 111 PID 4012 wrote to memory of 4368 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 111 PID 4012 wrote to memory of 4368 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 111 PID 4012 wrote to memory of 220 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 112 PID 4012 wrote to memory of 220 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 112 PID 4012 wrote to memory of 220 4012 {88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe 112 PID 4368 wrote to memory of 4084 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 113 PID 4368 wrote to memory of 4084 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 113 PID 4368 wrote to memory of 4084 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 113 PID 4368 wrote to memory of 2188 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 114 PID 4368 wrote to memory of 2188 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 114 PID 4368 wrote to memory of 2188 4368 {B432F317-4E75-4441-A41C-11975938B6CE}.exe 114 PID 4084 wrote to memory of 4080 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 115 PID 4084 wrote to memory of 4080 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 115 PID 4084 wrote to memory of 4080 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 115 PID 4084 wrote to memory of 3520 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 116 PID 4084 wrote to memory of 3520 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 116 PID 4084 wrote to memory of 3520 4084 {A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe 116 PID 4080 wrote to memory of 2980 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 117 PID 4080 wrote to memory of 2980 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 117 PID 4080 wrote to memory of 2980 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 117 PID 4080 wrote to memory of 3680 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 118 PID 4080 wrote to memory of 3680 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 118 PID 4080 wrote to memory of 3680 4080 {476622F9-017B-4044-BBC7-A88D4B1915B3}.exe 118 PID 2980 wrote to memory of 3196 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe 119 PID 2980 wrote to memory of 3196 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe 119 PID 2980 wrote to memory of 3196 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe 119 PID 2980 wrote to memory of 3720 2980 {671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_583e131dc564f0999013a64a9650035a_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\{696328C9-4EAD-498d-B40A-DC706F2D8955}.exeC:\Windows\{696328C9-4EAD-498d-B40A-DC706F2D8955}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exeC:\Windows\{7E6CA8EF-0C4E-4cd1-9352-974EB8D85C59}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\{F2268079-9E50-4692-A3BF-870A720BEC43}.exeC:\Windows\{F2268079-9E50-4692-A3BF-870A720BEC43}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\{3EC86697-8C19-46bf-8510-0994BDC272A8}.exeC:\Windows\{3EC86697-8C19-46bf-8510-0994BDC272A8}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\{D3DA443C-F2EF-441f-A99D-71D739A4495D}.exeC:\Windows\{D3DA443C-F2EF-441f-A99D-71D739A4495D}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exeC:\Windows\{88B03305-0CC6-4c6e-A965-0C5C79BB0DB4}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\{B432F317-4E75-4441-A41C-11975938B6CE}.exeC:\Windows\{B432F317-4E75-4441-A41C-11975938B6CE}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exeC:\Windows\{A1E451C2-E0DF-4aa4-A078-93D28F7F31D8}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\{476622F9-017B-4044-BBC7-A88D4B1915B3}.exeC:\Windows\{476622F9-017B-4044-BBC7-A88D4B1915B3}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\{671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exeC:\Windows\{671B4BC0-5E21-4075-957E-E61CC33B3EFD}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exeC:\Windows\{FE74EA03-8BB1-4334-B12A-80995B1EB4BE}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\{981C7918-8FA3-4763-ADC9-22256ED66A11}.exeC:\Windows\{981C7918-8FA3-4763-ADC9-22256ED66A11}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE74E~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{671B4~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{47662~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A1E45~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B432F~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{88B03~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3DA4~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3EC86~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F2268~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E6CA~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69632~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD56c90c1de03189b0e2d8f261b2a818949
SHA128666d773bca6e1b838354b413a2c4543aefbdde
SHA25643d799c6612d9f742bd943a671723065e8b7c11992218bb39d55c0259fc3aab3
SHA51278f915fcd2e13c5d163f46e1ee33109186708e28614efc07c9ffdfc56733759997c722f05f72975f8a200371dad358200d7de6881cf9b4ea45ba9728abc9a752
-
Filesize
180KB
MD5d72c68d575e7a93267ed0d82b523a683
SHA1a9cd94f80c7456d92112d236e84e0d823757ad4b
SHA2560ede84499c6185714db06d9fea3189338536b877072a11902d0422d35f786a2c
SHA512c26d52c41118ac9ee887b0671be653b7d7ad7031e2cc017290708fd3a2bde4002b3a57ad2adaad644b795ee86ceb3089d96bf4f9349a52a0a9be40ab650e8417
-
Filesize
180KB
MD5ab686f60fef1cb35b9555eacc13c1fce
SHA159d366a8830ff8fa1e23b6ad00cd6d54ff8ca411
SHA256ab67a13b826054b1734d67fcf7a9ad23c6c3a9738ca549b9d4cdbe8e471c619d
SHA5124254697a07e586c72fa943e0cc48eee2167c242aa54b4d615c49ee6cbe8107703c7261530943691263bfe265736173a1aa891ff80a42af39ea8acd149240c7fb
-
Filesize
180KB
MD5db35ebc3293df6488d33f6c3502bced3
SHA12321e05646d2cb664baff28a890d30085a964187
SHA25645da5b911626498e2d5ac632a58f243545139d6917d678c7876ba9a08db9c0d0
SHA5129f89b749f8011316efa8f4534ec53356c97ad048b4f4548ab5550a64796a635685d9ba9d6255efb5021a0ef38362749a2bab8c262a34acaed78fa26301cbea0a
-
Filesize
180KB
MD5d5f21e5ec5d30af451ec485efbf2f377
SHA13c9fb58e7570435138bc272a53a4188a939494cb
SHA2564dea0e0f562787ed24fd470d86fb1100b4efd065075f3b61a9fb994f51162989
SHA512bd09176ccf09ab1b3ee795817025f8e11b39c3e85ab4fd08f771224d9cbc6c9ec01dce43b491a13e8c2d65bde0bbb914be93ff22559fe52d7c0b01b54b6e3e4b
-
Filesize
180KB
MD50adb8a80e474e8e4ac84c2f1f8e9a237
SHA14f8f69c6101e3e0d6e3b057890dfe6cc6537a254
SHA25621ec86ebc1a4f457b3fb424ffb555413bcc9248c5721db3c716c23f047a86c24
SHA512bc7ea7299e93279191f338729025638481ec7c5bdef39d4129665a783a44578f1120fbcfdb6ecc716b8de24d868e94aa867daf2faba9dde4ee80e6562e26d44b
-
Filesize
180KB
MD5c5c72a89e7f4ac6657ebec9ac3a31258
SHA15130d672fa29ee047acb3291875270c83813153c
SHA256e1f373444a5079c15d5974acb9240d46f2d33ea818046aed6c8b5bcc0600b4c9
SHA512ef6c6632e542e729a10c8e32254182bd787c8c55c8715f8a469d32d10a627e778d11414a568e3078e295aaeac45925dd6fcd67a1ccff59a05b6958b14ca19dda
-
Filesize
180KB
MD55b2e942d7450a27560bc4888c4468488
SHA1fb6b8e98ac044011605267ca723bacd4322664a6
SHA256b5b186e8763ec3ac7754d1fd2cec60afd9445c06985da4f58f9109ead0c0be21
SHA5129132adae9874df003574848ee5bf8eb8ebd2737f2e6707cbfcc39e4099712daa89efcce072f577ca78b14e430a9ca6d0b8d67ce2b44fd41a053c12e21b84d051
-
Filesize
180KB
MD583df2f5730713cea920c8a0759910c93
SHA16ed85e53f7250491ff36038e0c6198be1b781ea1
SHA256be02713824b745dfaaf46d9dc4790d7f03bf1a7762df22b0abac6392ffb0c2d4
SHA512b15d530644624f4baf285b014712670495010f65e2be22c0cb087e0e6e280796f9b6a064a36c279fb38575577dd688c9a53967b01190970320be3c4fd9f28708
-
Filesize
180KB
MD54894bbdd76e00592a75ee2028d83b7b2
SHA1bf9d63a8c07de9d2291bb2316d450254b9d797eb
SHA256842430033cb4920d154531f0b8bc6675fd87f9680f9df98abbe71ea99c60cbb7
SHA512ccf3b3b130901843650792560515c6660d3d100a107083a7b5c9310158222d166555b9d7894818f4525d5bb584890ffa354b5e5557219ec02ff1e75c71db9cdd
-
Filesize
180KB
MD52306fe77867d810a2ded90feaa4ece70
SHA111e492ef095d6fbbff4e0e22b02f173670d6e5fe
SHA25671ddc82bd971c1f2df9407546535f043b33175861e86ec46f9ae61e157910059
SHA512118b0c9cc86736c96e2e39886967ad4a329fba435b6aa3dd637938f1c7ab417fdf096386f13e83b9238e8c4fe5ce50dc22aed754441b036da205d3891f316b72
-
Filesize
180KB
MD5f1261fc7f34a3415366501512f8a3242
SHA16f18ac9f754b6ac0f1c42bc5f3cae7017f9883a5
SHA25674bc1015b326e07ff8bb2159dc99b920fd0baad0022175d375a80cc989939862
SHA512577de490e1e2f8942cc417c3c08d62e036caca04755394836dd4e2612925aa9b263e91982b57d20039d97576de1d59249656d4361e698644c5ed54e3fb27aac9