Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe
-
Size
192KB
-
MD5
a8d82a2ebd236a7eedfefe6a561489dc
-
SHA1
3bb3397eefccae415898f39538d6982dcf9ddaca
-
SHA256
2a23a96b0916b6424da55d684b8f6ea2e6542910d6ec76c8de6cb526cdbc5101
-
SHA512
1bbc9510f5f287384e45ac18532bc83a8899dd802fa16bea1893def363db00b420ee92bc1498bbb60032d78dcc16836666d1f82a172895be5487a89a2430fe6d
-
SSDEEP
1536:1EGh0oxl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oxl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5} {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4} {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55DE1AB4-11CD-4510-B793-C7DC02F0A671} 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}\stubpath = "C:\\Windows\\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe" {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46} {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F} {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F}\stubpath = "C:\\Windows\\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe" {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{213D1142-1D60-434d-B2C0-55A720053B04} {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EFB6975-332B-4619-A3F2-53E2EA29BE99} {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67C1A92A-9068-41c2-806F-C7354C6B64DE} {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EFB6975-332B-4619-A3F2-53E2EA29BE99}\stubpath = "C:\\Windows\\{8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe" {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4} {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}\stubpath = "C:\\Windows\\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe" {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55DE1AB4-11CD-4510-B793-C7DC02F0A671}\stubpath = "C:\\Windows\\{55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe" 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{67C1A92A-9068-41c2-806F-C7354C6B64DE}\stubpath = "C:\\Windows\\{67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe" {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}\stubpath = "C:\\Windows\\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe" {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB} {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}\stubpath = "C:\\Windows\\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe" {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5} {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}\stubpath = "C:\\Windows\\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe" {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{213D1142-1D60-434d-B2C0-55A720053B04}\stubpath = "C:\\Windows\\{213D1142-1D60-434d-B2C0-55A720053B04}.exe" {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}\stubpath = "C:\\Windows\\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe" {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe -
Deletes itself 1 IoCs
pid Process 2956 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 1696 {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe 1632 {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe 2992 {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe 1156 {213D1142-1D60-434d-B2C0-55A720053B04}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe File created C:\Windows\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe File created C:\Windows\{67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe File created C:\Windows\{8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe File created C:\Windows\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe File created C:\Windows\{213D1142-1D60-434d-B2C0-55A720053B04}.exe {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe File created C:\Windows\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe File created C:\Windows\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe File created C:\Windows\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe File created C:\Windows\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe File created C:\Windows\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {213D1142-1D60-434d-B2C0-55A720053B04}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe Token: SeIncBasePriorityPrivilege 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe Token: SeIncBasePriorityPrivilege 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe Token: SeIncBasePriorityPrivilege 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe Token: SeIncBasePriorityPrivilege 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe Token: SeIncBasePriorityPrivilege 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe Token: SeIncBasePriorityPrivilege 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe Token: SeIncBasePriorityPrivilege 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe Token: SeIncBasePriorityPrivilege 1696 {A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe Token: SeIncBasePriorityPrivilege 1632 {C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe Token: SeIncBasePriorityPrivilege 2992 {EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2804 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 30 PID 2384 wrote to memory of 2804 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 30 PID 2384 wrote to memory of 2804 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 30 PID 2384 wrote to memory of 2804 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 30 PID 2384 wrote to memory of 2956 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 31 PID 2384 wrote to memory of 2956 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 31 PID 2384 wrote to memory of 2956 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 31 PID 2384 wrote to memory of 2956 2384 2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe 31 PID 2804 wrote to memory of 2576 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 32 PID 2804 wrote to memory of 2576 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 32 PID 2804 wrote to memory of 2576 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 32 PID 2804 wrote to memory of 2576 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 32 PID 2804 wrote to memory of 3064 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 33 PID 2804 wrote to memory of 3064 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 33 PID 2804 wrote to memory of 3064 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 33 PID 2804 wrote to memory of 3064 2804 {55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe 33 PID 2576 wrote to memory of 2568 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 34 PID 2576 wrote to memory of 2568 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 34 PID 2576 wrote to memory of 2568 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 34 PID 2576 wrote to memory of 2568 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 34 PID 2576 wrote to memory of 2672 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 35 PID 2576 wrote to memory of 2672 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 35 PID 2576 wrote to memory of 2672 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 35 PID 2576 wrote to memory of 2672 2576 {4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe 35 PID 2568 wrote to memory of 1160 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 36 PID 2568 wrote to memory of 1160 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 36 PID 2568 wrote to memory of 1160 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 36 PID 2568 wrote to memory of 1160 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 36 PID 2568 wrote to memory of 532 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 37 PID 2568 wrote to memory of 532 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 37 PID 2568 wrote to memory of 532 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 37 PID 2568 wrote to memory of 532 2568 {67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe 37 PID 1160 wrote to memory of 1932 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 38 PID 1160 wrote to memory of 1932 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 38 PID 1160 wrote to memory of 1932 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 38 PID 1160 wrote to memory of 1932 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 38 PID 1160 wrote to memory of 2372 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 39 PID 1160 wrote to memory of 2372 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 39 PID 1160 wrote to memory of 2372 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 39 PID 1160 wrote to memory of 2372 1160 {8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe 39 PID 1932 wrote to memory of 1284 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 40 PID 1932 wrote to memory of 1284 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 40 PID 1932 wrote to memory of 1284 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 40 PID 1932 wrote to memory of 1284 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 40 PID 1932 wrote to memory of 320 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 41 PID 1932 wrote to memory of 320 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 41 PID 1932 wrote to memory of 320 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 41 PID 1932 wrote to memory of 320 1932 {495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe 41 PID 1284 wrote to memory of 2728 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 43 PID 1284 wrote to memory of 2728 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 43 PID 1284 wrote to memory of 2728 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 43 PID 1284 wrote to memory of 2728 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 43 PID 1284 wrote to memory of 944 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 44 PID 1284 wrote to memory of 944 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 44 PID 1284 wrote to memory of 944 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 44 PID 1284 wrote to memory of 944 1284 {818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe 44 PID 2728 wrote to memory of 1696 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 45 PID 2728 wrote to memory of 1696 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 45 PID 2728 wrote to memory of 1696 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 45 PID 2728 wrote to memory of 1696 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 45 PID 2728 wrote to memory of 1064 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 46 PID 2728 wrote to memory of 1064 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 46 PID 2728 wrote to memory of 1064 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 46 PID 2728 wrote to memory of 1064 2728 {6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-01_a8d82a2ebd236a7eedfefe6a561489dc_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\{55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exeC:\Windows\{55DE1AB4-11CD-4510-B793-C7DC02F0A671}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exeC:\Windows\{4491F9C6-A4F5-4d47-A1F5-02172B56CAC5}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{67C1A92A-9068-41c2-806F-C7354C6B64DE}.exeC:\Windows\{67C1A92A-9068-41c2-806F-C7354C6B64DE}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\{8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exeC:\Windows\{8EFB6975-332B-4619-A3F2-53E2EA29BE99}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exeC:\Windows\{495D8FAA-CA14-47cf-82DF-A14E89CFD1F4}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exeC:\Windows\{818C5A4F-1F4E-4c3c-91B9-C2971C0624DB}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exeC:\Windows\{6A1F69FD-8DDC-42dd-BB01-96DF8D559AC4}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exeC:\Windows\{A6B85ED3-DF18-47a1-9164-B7C8EBE17C46}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exeC:\Windows\{C4B66ABB-3C04-4c33-A838-1F66C3BDB9E5}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exeC:\Windows\{EB171081-8ACA-4e6d-B5D0-FF53EA37932F}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
C:\Windows\{213D1142-1D60-434d-B2C0-55A720053B04}.exeC:\Windows\{213D1142-1D60-434d-B2C0-55A720053B04}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EB171~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4B66~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6B85~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A1F6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{818C5~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{495D8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8EFB6~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67C1A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4491F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55DE1~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD55bce25d8d948db48a4c0e6c4813aa5c1
SHA16e435e59f49546cfd6c91dad15f2466ca141d471
SHA256e26f1ab368ecb289ed78582b4a17de9ba6f10d4d7684218cff36f7718f846c1f
SHA512e3047ec09e041ca382dcc7eb6ee75ffd7ab97f581804f6aa1d65f3a374fce25476af75bc4b055cd1c07c8b52edd7fba4d302ee53b61b30c41e538b42f22ece34
-
Filesize
192KB
MD58f9f872515cc58b8d0a361f4f587d6da
SHA1c3877727f52a276f354f5f14caf7cd920d2b2a60
SHA256c58edbf8dcfd7a23e3e13de8daa1c147e28eec4bca37bb6786cc727f2a6edc5c
SHA5121165265a1e8a7c71dccfb17f9d5c0b9d5b16950ccf255904b258a76ce412c4f20e8efd4f0e1242b048a60a9f306620439737126e298704468275f31db17ae916
-
Filesize
192KB
MD5a02ad9c3e1a7c20b7462c6053e84e357
SHA1e96d6e8323e53e2389d88e6887211a92c2010a0d
SHA25695bb9e6687099f94aadffa3953869cad5200d2cd44397d1de4b358dc6b0eed48
SHA5124abe668aaa8407906d03f909dd6598db84e333100033df3e29fa912ff20cc7723f189b6e471b3875d7c6e3eccc45025678ea0f4af03eb3635070aafcbc83f901
-
Filesize
192KB
MD5e2749f7197c60298dfb22cf0293ee604
SHA1bb3862def5a7f20ed65be70c08d4bff6024afb75
SHA256572d179c38812877559f0517f2697f5546bf6d52eae08c93250fced360cf022c
SHA51290a97d21f06c708b4fcd0f21b8aaef3aded05fd9800ae5197c63ecdc36f9c880115c3f65cd12fffd124badc9d5fa2136851edd9e4393e7d69884ed5a462dc6be
-
Filesize
192KB
MD531fff9c623a20d6ade24dd0bb92126f7
SHA1948c4a1bdf7503f16dfc232cdc28a0464e0937a0
SHA256956e5920838189afd3e1e9015237a8ac92d63860062ea8887da4ae027a45975a
SHA512c3980e17f3c49d15a638b62852bc8586fc4bf4192ce1dd71e6af836d85a782bc9d6dc9d889c3d15eb0e11486a22d02b4c71a40d036022f46027142faf4377728
-
Filesize
192KB
MD5da91e27a8570840d50d03b73b346fb6d
SHA177dbf99803358888bfa75344f41c25ae778dc449
SHA25687a271168684289bbce2f074c5d8113061c70b41fc9b077e3090cac9411fca03
SHA5129532d34df6eea940f333102c19cbaad9f53f145166366a73f2532f56fac3475d0fd208827a6babfa0e14cc9cd2a1e1d1c2e16ba82b8a9cf446c850306b441355
-
Filesize
192KB
MD5931d1304a56a6491e4c127dec93b3af7
SHA1112cbd27c3a0dbf3698b5e0c4207b6dc7f8596f1
SHA2565169d049d56196d13d8fe71cceaf20658f5d066efc93c1a3559ea03871b1b179
SHA512ddd06f8d56dd2169cbc2bad5ec3bcfe73193b93b4b13d525354b6f87bd3ce936a4a9865a319faff0c60646e97e9f7f5a8126609a544febc02a67ca03063d1112
-
Filesize
192KB
MD5e14469a846c8fa7d0d8328d221ecb968
SHA1368691a7c89ed88e8fdc53f2c2fcf63f9535124f
SHA256f7563e546bc39e670406a1b3e76e952b15d3e0889df532aea6b882706d20531e
SHA51283c0b697c75026b2dbf220980d9da507278e802eac6372d235b8fdde5de3b1b3f053e85ab84cd72d0ac8289200e3c017ef4a699baf1422a2ae601159e6321633
-
Filesize
192KB
MD5cc1f5978a7bdf3c92adbe84874f6aa7c
SHA10e5c13508e14c3af0ce19a61809d491843507239
SHA25670536b88588d1b3fb0855c8d150caae6f62f3a5f67ffc4eabecef31c8797f626
SHA5122494ccbb675fbd35329833eca8b71fa7fbe22093b7840d73bc9ffc0d9d12f32c29ef6ab70d215108e3e3c3cc6227de793b8bb8dc346c7d3a684858d54fb57aea
-
Filesize
192KB
MD560096cf604ab5fddf5455c15bac1d5da
SHA15c03e47c583c794c70c9a1659ff94abf3d87212d
SHA256eb2d97e07d59ff1cea3f091297d9ac4a9b92e52fc3c1dcacb48ab86b6c9ab388
SHA51252d58cb46bbdad162d613251ffe943c716eff9b02577ee77632da64044a92cdf6a4a0c2530e8a3b027e1b5b6ef844ef5e3ffd5ada1e84ab7f95df98456340325
-
Filesize
192KB
MD5de9ccc2de8ee1d04ea9c08f6d31e839f
SHA120e041648e1b82de4c29371c9631e519e0a8fdb0
SHA2566f83fbb1d5d22a67f85840f1f2dfdde27478a88c8f7342d07a9e66ad3388917e
SHA51218f690b084b26531d3da47dc18e3f0ae0cf3d99e4685e7d0d5022ac9e7954272b5999d18a9b55bb604a25a78eebd69a8d292494c0ad49e092c51c886df4cf05a