Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe
-
Size
192KB
-
MD5
f7aa20ee477587f5e0d1e39b43a09fb6
-
SHA1
9a67f6ffda515d4f78c05758e9d17f916c243d22
-
SHA256
ca1952270c44abd4d6fbf81557211726efade33817e07c4a079af72dd352ae7a
-
SHA512
c046d80c8389d45139c728c9b8be013d5d630b5bdb3fa447bc23ab41f3d8a5a8e7cceb8257a9aad30c8e35a326d3411c70962efeccf01c78004794d5187df01a
-
SSDEEP
1536:1EGh0ogl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0ogl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{373602ED-3F6F-41a1-AE37-948F7516043B} 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{880CDCED-FF3A-489a-86A2-E2378EEF75B9} {373602ED-3F6F-41a1-AE37-948F7516043B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}\stubpath = "C:\\Windows\\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe" {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2} {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C25116E3-6E05-4fec-861C-3CD545DDE7F8}\stubpath = "C:\\Windows\\{C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe" {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F66FE6A9-1809-4ee7-8299-5B9123CA6C4E}\stubpath = "C:\\Windows\\{F66FE6A9-1809-4ee7-8299-5B9123CA6C4E}.exe" {C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{880CDCED-FF3A-489a-86A2-E2378EEF75B9}\stubpath = "C:\\Windows\\{880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe" {373602ED-3F6F-41a1-AE37-948F7516043B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF}\stubpath = "C:\\Windows\\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe" {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369} {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}\stubpath = "C:\\Windows\\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe" {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}\stubpath = "C:\\Windows\\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe" {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E} {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F66FE6A9-1809-4ee7-8299-5B9123CA6C4E} {C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}\stubpath = "C:\\Windows\\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe" {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{373602ED-3F6F-41a1-AE37-948F7516043B}\stubpath = "C:\\Windows\\{373602ED-3F6F-41a1-AE37-948F7516043B}.exe" 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C} {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}\stubpath = "C:\\Windows\\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe" {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF} {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE} {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}\stubpath = "C:\\Windows\\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe" {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1} {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C25116E3-6E05-4fec-861C-3CD545DDE7F8} {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}\stubpath = "C:\\Windows\\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe" {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC} {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe -
Executes dropped EXE 11 IoCs
pid Process 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe 3520 {C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{373602ED-3F6F-41a1-AE37-948F7516043B}.exe 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe File created C:\Windows\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe File created C:\Windows\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe File created C:\Windows\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe File created C:\Windows\{C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe File created C:\Windows\{880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe {373602ED-3F6F-41a1-AE37-948F7516043B}.exe File created C:\Windows\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe File created C:\Windows\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe File created C:\Windows\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe File created C:\Windows\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe File created C:\Windows\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {373602ED-3F6F-41a1-AE37-948F7516043B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F66FE6A9-1809-4ee7-8299-5B9123CA6C4E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe Token: SeIncBasePriorityPrivilege 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe Token: SeIncBasePriorityPrivilege 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe Token: SeIncBasePriorityPrivilege 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe Token: SeIncBasePriorityPrivilege 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe Token: SeIncBasePriorityPrivilege 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe Token: SeIncBasePriorityPrivilege 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe Token: SeIncBasePriorityPrivilege 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe Token: SeIncBasePriorityPrivilege 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe Token: SeIncBasePriorityPrivilege 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe Token: SeIncBasePriorityPrivilege 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 3532 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 89 PID 556 wrote to memory of 3532 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 89 PID 556 wrote to memory of 3532 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 89 PID 556 wrote to memory of 2480 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 90 PID 556 wrote to memory of 2480 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 90 PID 556 wrote to memory of 2480 556 2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe 90 PID 3532 wrote to memory of 1156 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 91 PID 3532 wrote to memory of 1156 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 91 PID 3532 wrote to memory of 1156 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 91 PID 3532 wrote to memory of 2084 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 92 PID 3532 wrote to memory of 2084 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 92 PID 3532 wrote to memory of 2084 3532 {373602ED-3F6F-41a1-AE37-948F7516043B}.exe 92 PID 1156 wrote to memory of 3852 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 95 PID 1156 wrote to memory of 3852 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 95 PID 1156 wrote to memory of 3852 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 95 PID 1156 wrote to memory of 1636 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 96 PID 1156 wrote to memory of 1636 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 96 PID 1156 wrote to memory of 1636 1156 {880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe 96 PID 3852 wrote to memory of 3160 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 97 PID 3852 wrote to memory of 3160 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 97 PID 3852 wrote to memory of 3160 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 97 PID 3852 wrote to memory of 5016 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 98 PID 3852 wrote to memory of 5016 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 98 PID 3852 wrote to memory of 5016 3852 {4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe 98 PID 3160 wrote to memory of 4192 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 99 PID 3160 wrote to memory of 4192 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 99 PID 3160 wrote to memory of 4192 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 99 PID 3160 wrote to memory of 220 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 100 PID 3160 wrote to memory of 220 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 100 PID 3160 wrote to memory of 220 3160 {A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe 100 PID 4192 wrote to memory of 3156 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 101 PID 4192 wrote to memory of 3156 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 101 PID 4192 wrote to memory of 3156 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 101 PID 4192 wrote to memory of 1784 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 102 PID 4192 wrote to memory of 1784 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 102 PID 4192 wrote to memory of 1784 4192 {FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe 102 PID 3156 wrote to memory of 2184 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 103 PID 3156 wrote to memory of 2184 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 103 PID 3156 wrote to memory of 2184 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 103 PID 3156 wrote to memory of 2144 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 104 PID 3156 wrote to memory of 2144 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 104 PID 3156 wrote to memory of 2144 3156 {7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe 104 PID 2184 wrote to memory of 2020 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 105 PID 2184 wrote to memory of 2020 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 105 PID 2184 wrote to memory of 2020 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 105 PID 2184 wrote to memory of 1148 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 106 PID 2184 wrote to memory of 1148 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 106 PID 2184 wrote to memory of 1148 2184 {03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe 106 PID 2020 wrote to memory of 1592 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 107 PID 2020 wrote to memory of 1592 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 107 PID 2020 wrote to memory of 1592 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 107 PID 2020 wrote to memory of 4276 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 108 PID 2020 wrote to memory of 4276 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 108 PID 2020 wrote to memory of 4276 2020 {06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe 108 PID 1592 wrote to memory of 4700 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 109 PID 1592 wrote to memory of 4700 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 109 PID 1592 wrote to memory of 4700 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 109 PID 1592 wrote to memory of 3668 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 110 PID 1592 wrote to memory of 3668 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 110 PID 1592 wrote to memory of 3668 1592 {67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe 110 PID 4700 wrote to memory of 3520 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe 111 PID 4700 wrote to memory of 3520 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe 111 PID 4700 wrote to memory of 3520 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe 111 PID 4700 wrote to memory of 4308 4700 {7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_f7aa20ee477587f5e0d1e39b43a09fb6_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\{373602ED-3F6F-41a1-AE37-948F7516043B}.exeC:\Windows\{373602ED-3F6F-41a1-AE37-948F7516043B}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\{880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exeC:\Windows\{880CDCED-FF3A-489a-86A2-E2378EEF75B9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exeC:\Windows\{4BE3AAEF-2D4D-488a-905A-6D4E9295B48C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exeC:\Windows\{A2411F5F-AE76-4c97-ABD7-180B35BE84DF}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exeC:\Windows\{FD5F8AF2-BC3C-485a-8C52-D2B2041B1369}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exeC:\Windows\{7EED830D-68F2-434a-ABB0-E9D3DBDF56BE}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exeC:\Windows\{03ED41D8-AFCC-434f-91FF-BE55A2B48CE1}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exeC:\Windows\{06CF7E1C-58CD-4773-BB6E-921E18E6BCB2}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exeC:\Windows\{67D4DF2F-A357-4f2a-93BC-EFCB9C93E44E}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exeC:\Windows\{7818C4B7-E7E2-45cd-B1CF-F6CC9F9627DC}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\{C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exeC:\Windows\{C25116E3-6E05-4fec-861C-3CD545DDE7F8}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\{F66FE6A9-1809-4ee7-8299-5B9123CA6C4E}.exeC:\Windows\{F66FE6A9-1809-4ee7-8299-5B9123CA6C4E}.exe13⤵
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2511~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7818C~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67D4D~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{06CF7~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{03ED4~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EED8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD5F8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2411~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BE3A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{880CD~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37360~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD51de2cfc2dc4bf87dc77783b0feeda87a
SHA134e3c8177db9f99fc1309de6253bc65f2ad7ce3d
SHA25677b2dcb6ad24e812853372208c7d5ebad74eb4ff9cefb0719830a35250c23189
SHA51291f6e8f1c74eeef45e0799a693a2b2f332a55c9668d3376fe2e50e491aae0a9b4cef16fdc81e1dc962fb4be9f008c7838e915dd7f74a141163c0660a52f48d79
-
Filesize
192KB
MD5ceab16141160dff199368e04af4cddf4
SHA1a055c1e057e11c8081dcce128bd3610818a57182
SHA25646e5f0c8cb3ceb9dd105f41fb5914f6f6dfaaad6a84342dc03be6355ba6c5f65
SHA512f72f8adf6f05077101a62e34ab1bd105306c1af6e676413b249ba8aebf57689954e1377c59afc9490669aa6c49351fc2f87ae768e43f6ae3127841b1b8dab525
-
Filesize
192KB
MD596ce1d86166e3b36a8f94f2c66391ca4
SHA1afd9dc1830b9f55ddc591dc9c84664c4a84473bd
SHA2564efd64f85f6d0128756a31b7311d092e0a183ddfcfe4afc5c738684dd00f4f58
SHA51247780d9cced5592de7312f964ddda5b9e064e993665ad7c7510cfe7fcffbd05236d93dfa3e89de61f299c97b2790aa36b936fefaceae94c6d6d902dadb0555dc
-
Filesize
192KB
MD5ec5a369e6fc37321563531bde99d9cba
SHA176e3f3ce57b66c0d72087b963b8a3021a062c87a
SHA256eb2af34970491c014a17f97bf7b12294d6c1581c4107989b9b963ed61d971859
SHA51205fb77c4245ed4d438f08ac030e9e2927f306b6ea9e000736d4216aadc4de6557a9bc1c5b1d061914ded00a727b0d1d5bf5275191bb2f957645f31c32eb61693
-
Filesize
192KB
MD56b0d10f9005cf1eb56a25d05efdc650f
SHA165f9980510ede237be5738182186367bdf5db095
SHA2569e36be6bd63cb4400f2c4d2a03a32803fe40d55bd90bdf9a30d46bca9f2ec844
SHA512ecae0ff5f80c97494c1fa01a5b4c1efd9d4884103617f8fad3885f6aaa0bf21c0a7900ed02828b1da5b937702815169cd0d5e86afc7e5aaa45bc2cd5330e7b64
-
Filesize
192KB
MD5b71ccdd5dfd5bdcf7f3308fe0f187cf4
SHA17e00e6d8bc701ecc21290b2dff7b1dad4cafacd9
SHA2566107a53a1ea78500f40f0cd43689cae3369711804dfe80ef5df8c1d6a9bfb4a0
SHA512db80ad546f5eedfd932edddeb45c408b03a16924e0f3e754aeb4c5c6aefb1ea11115e2c50311ad7b989142c271b47c1f4bfa66265ae2ab58290d65296f524b3d
-
Filesize
192KB
MD59029e3ea3afbb788b4d3abffe8a4a674
SHA184169ec67dcdb39508e66ecda4334420d2baf55c
SHA2566dfe428c8ae60b9db6094837860d5726928fb807eb361a0c654ba6c4d8fb14f4
SHA512dfe65a95a32e0d2628ec5275819cdf3d3ab53f9bb28495ecd897ea1e3966d0f1e20a7102244bcec257d51c4ab2382d14b229b8182028c5c6f1aa51cf657dde75
-
Filesize
192KB
MD5965273ba595b36ab0ce258f18bf71e1c
SHA171ede22b3aa1ec677a9a3857fff5717d221c0967
SHA25618c896608bc5420efc991478c8e707d4496cee65cacca818e5505096789001ad
SHA5123cf0dcd68b937b50c928ccf8851e43b8ba094fd29a709827d1e9b1660ed3a6c1113cd3305abfdaeae359985df2a0993b29a762b6cc8c730760703515bb61c77f
-
Filesize
192KB
MD5916126c7fd1835b030eb3694dbb058e9
SHA11a2df994892243ac526a94ff3391943f99202444
SHA2567383b0fcebe807ecd3f459e6b84896b393192c5e5f33405c88d1b45440e76be7
SHA512c4572da90c217a73f44b7d534b3923bf28d83e4502c12b682f11e50ab4a844778509c8758d1c18262cca8ed13cae477c2e5484a42c561dbc5e024e4b6cb8ddde
-
Filesize
192KB
MD5d256392aa3e703e9dd8e20f1121021d3
SHA1ec5b439ee09a397d16ae792448eb2e7436ca26d8
SHA256f38331ad22e34e485ae86d90eefe3eab7ae6d4267d1df3b8f0a8627bed479801
SHA5129a613350948c4c9d06ff8a6b04d7639c26a838473df3b10012ff0e0c1fe82273da9eb5fe9ec2f193e1fc04682904e7f32f821b075a94b3a2c7ccda4df2b7bf52
-
Filesize
192KB
MD57fc3b25a1e537622625c3217bc324ee7
SHA1a171a4dcebe9c6ee7b7ce6d04b6a0477ea165976
SHA25627641cc4e207d9e9c1bed8bff56cfbebcc5093befb15d4873a8da732eb224f06
SHA512b60725fa31c9295147c39b33e58a96514995dc1feaaf03b98cce1e76675222113bef54d3fd41c92449d523b2486abf05373131d330d0f20332407d8e7615a6e5