Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 21:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe
-
Size
192KB
-
MD5
4d4c4beb28cdb26fc9e135713c74482d
-
SHA1
c8c120fd7352b22c69ae8c8498ea627d67182b5b
-
SHA256
755308bee753dbd1021527b66d26ecfe178cbc31006aee4cf17a07dad014cacd
-
SHA512
f39a7f65b1f4f02d379667478c4e4da03d833c420dc8c29a3eaa6798671d4ce2fb74ec357caf7f529213eedc7373a662ee5628059ac0b4a018ee79a1ae59c7c7
-
SSDEEP
1536:1EGh0oSl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oSl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C0550B-6098-4ea7-87E6-845100D695B8} 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975} {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{673D2B57-BF29-45f1-836A-BDE5FE03AD90}\stubpath = "C:\\Windows\\{673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe" {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9C730939-007A-4d36-AB36-49781D610624} {E03F346E-D623-4933-A07D-69EFDE54B176}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A99A0F6-5AD8-4805-AED0-F567BB856072}\stubpath = "C:\\Windows\\{6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe" {9C730939-007A-4d36-AB36-49781D610624}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975}\stubpath = "C:\\Windows\\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe" {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E03F346E-D623-4933-A07D-69EFDE54B176}\stubpath = "C:\\Windows\\{E03F346E-D623-4933-A07D-69EFDE54B176}.exe" {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A99A0F6-5AD8-4805-AED0-F567BB856072} {9C730939-007A-4d36-AB36-49781D610624}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77C988B1-0BC8-42c0-B7D9-5B81A585251F}\stubpath = "C:\\Windows\\{77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe" {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A82A6224-F7FB-4496-A0F9-C5297619F953} {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A5CA1E26-6BD0-4e73-B531-D7B18495A006} {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1} {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1C0550B-6098-4ea7-87E6-845100D695B8}\stubpath = "C:\\Windows\\{E1C0550B-6098-4ea7-87E6-845100D695B8}.exe" 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE853C90-6170-4e11-AB11-0CD214C23B84}\stubpath = "C:\\Windows\\{CE853C90-6170-4e11-AB11-0CD214C23B84}.exe" {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{673D2B57-BF29-45f1-836A-BDE5FE03AD90} {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9C730939-007A-4d36-AB36-49781D610624}\stubpath = "C:\\Windows\\{9C730939-007A-4d36-AB36-49781D610624}.exe" {E03F346E-D623-4933-A07D-69EFDE54B176}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{77C988B1-0BC8-42c0-B7D9-5B81A585251F} {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A82A6224-F7FB-4496-A0F9-C5297619F953}\stubpath = "C:\\Windows\\{A82A6224-F7FB-4496-A0F9-C5297619F953}.exe" {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE853C90-6170-4e11-AB11-0CD214C23B84} {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E03F346E-D623-4933-A07D-69EFDE54B176} {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A5CA1E26-6BD0-4e73-B531-D7B18495A006}\stubpath = "C:\\Windows\\{A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe" {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1}\stubpath = "C:\\Windows\\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exe" {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe -
Deletes itself 1 IoCs
pid Process 112 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 1384 {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe 2164 {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe 2092 {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe 448 {2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CE853C90-6170-4e11-AB11-0CD214C23B84}.exe {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe File created C:\Windows\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe File created C:\Windows\{673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe File created C:\Windows\{E03F346E-D623-4933-A07D-69EFDE54B176}.exe {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe File created C:\Windows\{77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe File created C:\Windows\{A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe File created C:\Windows\{E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe File created C:\Windows\{6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe {9C730939-007A-4d36-AB36-49781D610624}.exe File created C:\Windows\{A82A6224-F7FB-4496-A0F9-C5297619F953}.exe {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe File created C:\Windows\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exe {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe File created C:\Windows\{9C730939-007A-4d36-AB36-49781D610624}.exe {E03F346E-D623-4933-A07D-69EFDE54B176}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9C730939-007A-4d36-AB36-49781D610624}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E03F346E-D623-4933-A07D-69EFDE54B176}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe Token: SeIncBasePriorityPrivilege 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe Token: SeIncBasePriorityPrivilege 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe Token: SeIncBasePriorityPrivilege 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe Token: SeIncBasePriorityPrivilege 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe Token: SeIncBasePriorityPrivilege 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe Token: SeIncBasePriorityPrivilege 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe Token: SeIncBasePriorityPrivilege 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe Token: SeIncBasePriorityPrivilege 1384 {77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe Token: SeIncBasePriorityPrivilege 2164 {A82A6224-F7FB-4496-A0F9-C5297619F953}.exe Token: SeIncBasePriorityPrivilege 2092 {A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3048 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 31 PID 2004 wrote to memory of 3048 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 31 PID 2004 wrote to memory of 3048 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 31 PID 2004 wrote to memory of 3048 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 31 PID 2004 wrote to memory of 112 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 32 PID 2004 wrote to memory of 112 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 32 PID 2004 wrote to memory of 112 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 32 PID 2004 wrote to memory of 112 2004 2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe 32 PID 3048 wrote to memory of 2772 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 33 PID 3048 wrote to memory of 2772 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 33 PID 3048 wrote to memory of 2772 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 33 PID 3048 wrote to memory of 2772 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 33 PID 3048 wrote to memory of 2892 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 34 PID 3048 wrote to memory of 2892 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 34 PID 3048 wrote to memory of 2892 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 34 PID 3048 wrote to memory of 2892 3048 {E1C0550B-6098-4ea7-87E6-845100D695B8}.exe 34 PID 2772 wrote to memory of 2576 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 35 PID 2772 wrote to memory of 2576 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 35 PID 2772 wrote to memory of 2576 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 35 PID 2772 wrote to memory of 2576 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 35 PID 2772 wrote to memory of 2888 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 36 PID 2772 wrote to memory of 2888 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 36 PID 2772 wrote to memory of 2888 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 36 PID 2772 wrote to memory of 2888 2772 {CE853C90-6170-4e11-AB11-0CD214C23B84}.exe 36 PID 2576 wrote to memory of 2736 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 37 PID 2576 wrote to memory of 2736 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 37 PID 2576 wrote to memory of 2736 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 37 PID 2576 wrote to memory of 2736 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 37 PID 2576 wrote to memory of 2568 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 38 PID 2576 wrote to memory of 2568 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 38 PID 2576 wrote to memory of 2568 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 38 PID 2576 wrote to memory of 2568 2576 {D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe 38 PID 2736 wrote to memory of 2160 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 39 PID 2736 wrote to memory of 2160 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 39 PID 2736 wrote to memory of 2160 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 39 PID 2736 wrote to memory of 2160 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 39 PID 2736 wrote to memory of 2196 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 40 PID 2736 wrote to memory of 2196 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 40 PID 2736 wrote to memory of 2196 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 40 PID 2736 wrote to memory of 2196 2736 {673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe 40 PID 2160 wrote to memory of 2964 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 41 PID 2160 wrote to memory of 2964 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 41 PID 2160 wrote to memory of 2964 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 41 PID 2160 wrote to memory of 2964 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 41 PID 2160 wrote to memory of 2804 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 42 PID 2160 wrote to memory of 2804 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 42 PID 2160 wrote to memory of 2804 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 42 PID 2160 wrote to memory of 2804 2160 {E03F346E-D623-4933-A07D-69EFDE54B176}.exe 42 PID 2964 wrote to memory of 844 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 43 PID 2964 wrote to memory of 844 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 43 PID 2964 wrote to memory of 844 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 43 PID 2964 wrote to memory of 844 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 43 PID 2964 wrote to memory of 784 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 44 PID 2964 wrote to memory of 784 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 44 PID 2964 wrote to memory of 784 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 44 PID 2964 wrote to memory of 784 2964 {9C730939-007A-4d36-AB36-49781D610624}.exe 44 PID 844 wrote to memory of 1384 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 45 PID 844 wrote to memory of 1384 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 45 PID 844 wrote to memory of 1384 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 45 PID 844 wrote to memory of 1384 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 45 PID 844 wrote to memory of 896 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 46 PID 844 wrote to memory of 896 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 46 PID 844 wrote to memory of 896 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 46 PID 844 wrote to memory of 896 844 {6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_4d4c4beb28cdb26fc9e135713c74482d_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\{E1C0550B-6098-4ea7-87E6-845100D695B8}.exeC:\Windows\{E1C0550B-6098-4ea7-87E6-845100D695B8}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\{CE853C90-6170-4e11-AB11-0CD214C23B84}.exeC:\Windows\{CE853C90-6170-4e11-AB11-0CD214C23B84}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exeC:\Windows\{D525414D-F9D9-49e9-BD27-E1C6EBD0D975}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\{673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exeC:\Windows\{673D2B57-BF29-45f1-836A-BDE5FE03AD90}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\{E03F346E-D623-4933-A07D-69EFDE54B176}.exeC:\Windows\{E03F346E-D623-4933-A07D-69EFDE54B176}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\{9C730939-007A-4d36-AB36-49781D610624}.exeC:\Windows\{9C730939-007A-4d36-AB36-49781D610624}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\{6A99A0F6-5AD8-4805-AED0-F567BB856072}.exeC:\Windows\{6A99A0F6-5AD8-4805-AED0-F567BB856072}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\{77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exeC:\Windows\{77C988B1-0BC8-42c0-B7D9-5B81A585251F}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\{A82A6224-F7FB-4496-A0F9-C5297619F953}.exeC:\Windows\{A82A6224-F7FB-4496-A0F9-C5297619F953}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Windows\{A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exeC:\Windows\{A5CA1E26-6BD0-4e73-B531-D7B18495A006}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exeC:\Windows\{2F481A0B-DE81-4504-AA46-ED7A33F87DC1}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A5CA1~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A82A6~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77C98~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6A99A~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C730~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E03F3~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{673D2~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D5254~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE853~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C05~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD583174ac6e4fa7bfe3954967ececedf0b
SHA1e331b1b6e9ff0b656c991f6286d0a91889fcfce9
SHA25668702402ec2a1f5b0848964edec124b94247aa6f566f48f3448ecf7a545827da
SHA5122af18f664ff7aef61306a1e08c45c25841830c347a5f1441cd321181f12b2192c98a7c910432da5d1ee8ba7d1ef67c37e70edd44f449ffc7b5b2b88a5088d34e
-
Filesize
192KB
MD56dc771ccb5527d4529b2c7a85993fdfd
SHA18d87676ed7ca2739c44c250f30aebd75d5c1dbad
SHA256490c1d2e65875aa1092898737e04c6023f0a01f1021a1bca7b39dcf4726f771d
SHA512970d2ef4a95100da99345959e68ca9997a505bdc4414d11974d302a0b9e981bdf5d2fb608e56190da6f63342b02ff6c22cce2ada1b310d25f5dbe75fc65fcfe2
-
Filesize
192KB
MD53f2c5488779a413789eda32da4636cb6
SHA1f560777b89ae723cd135b8980ad8bb9401d17ea9
SHA256962fc0c2cdd7b0bb6a90a3e5df491784a644933f152233dc68394d511af11639
SHA5129ba81d74f7ecb535801e9520a12f9a0600df4f2271e347da8ac5f834ad31b4dcf63d397f86606c14d2b2a68e5e7df10dc185e0f104a6104da90bea948e3665ff
-
Filesize
192KB
MD5ce942543a89070e6205dd8f0a1accd0e
SHA1eb003db6000371adf50c677f7424c8545c2864fe
SHA25653bb7b432b4a2cb07fc4f8883ff955b5870e5bb42abd1cb485da25476b6a2601
SHA512e379b7b51b3dc52078b5cf701aeb87788aa605449a3bdc8c384d03af058cc01f18374e127e26bfc4d091237bf4611322e7234309f412a516984960b617edfc51
-
Filesize
192KB
MD558972b0060a1338204c4e5ec3d7cb5f6
SHA14684298dfdd8fc291070917794a94d165481eeee
SHA256354e37e70cc049b0e2489f4680b2668ce1e808906f11ff1a7e194a60092f96f8
SHA512b0d0cb409a8a72538208fc9ebe990c913a2947ce2098089d21cf40b2bf0dd71ce72f6b420fe4584a350fc76c387dbe71fbe4bdbd43554f99114bd549497debce
-
Filesize
192KB
MD5c76c1b02bb84f314a15db106cd4b064c
SHA1ab8b04e94b140b9ad3b7af6170fed85d17e9571e
SHA256d23e0b17ebc8615b3912db4ce1a8fa400c4be700b03d09f3abf731674500ece3
SHA5126709da19b60cebd4a9264fcee46759e6eacc655d8a156c76a8a21b89aa9c57401689eb79ba9aea6b56f59da6ad08559eaf20f8108932fe2d47f1bffcfd95a9ed
-
Filesize
192KB
MD53690446ec1f7ddd0c79917092fe1e577
SHA1d4a96cf36e7a9f7cfd91f36beb805e48e5f22fe7
SHA2562526098f6168c015046dd2e4a7338d2f06f3eec8c591ba3e4231d652d37f6fb7
SHA512bb0d393351e9c04d020680dd555b680055e5f2c7e1b0a7db23fad6db37013cc5512a3d6a73b21c89804d55788931534b2a25324db7f556beb01494bf53a9f6ad
-
Filesize
192KB
MD5699f0aa669ff2d2dbacd0aaf07640896
SHA1dab89013490536b0cb6c910188b8bcd1ba014313
SHA256123b9be56fda28c727886bb1718d449afde92e49c1341be5c37e283051815a8a
SHA51268f0e2270e75fb0f4395cba07a41020d531f287a4a3f5dc1e65a54c2521b6c869385582a38ce758b039efa6ab2fca6cd27c7112a8d6d9ab44c0179b742b80913
-
Filesize
192KB
MD56ed49330f416d04f1094eed7d4ecb03d
SHA1a55236b1f238dc0ca9106f8891ce6913481de513
SHA256ffd5fb9de33cf3b736a7d8227d313231d41307ceeed4afbc3d0932e2aae1600d
SHA512e3c1a79eab9ccea0f03c93c9ce9b1eb69778eada15977754b96d209cc6b27b2ce898bd4396591103b7fa73672739cd5d564653111b069b522139220262e8e021
-
Filesize
192KB
MD5795ceda0f739f767c6ecf1429dce13dc
SHA11d67b53399af2c2f8d7bb24dbed33691dc327eae
SHA2564bb596d91e7d5fbb7006b2ff2b44bdc025a288ba2ec796248e405ca3975e1776
SHA512cfa3c3cfc254c65a6ffc4953f5edb4123a888c7f0ad907ca84e9d4203a51ce5af23eefb77ea963db58394db912ee9997712a26662a3e1f224e3493389aa0a310
-
Filesize
192KB
MD5c56d1334fb7e13279d705a9d5b18bd4d
SHA174998e45aed4f404547a522303e11b6805d56773
SHA256da526297042b43595a03cb493e3df41b41437a733155268166d7045b92fc13c7
SHA5123436b6b6b85ed265ba6e18a8ba282e2dfcafab7e94950b053878e6075df3db9703b98417521c0a4606291521597fce64a9b09c9b79d6003ee3522e1c7ec7612d