Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe
-
Size
344KB
-
MD5
6e75a3e3ede151baef946c72c10b833f
-
SHA1
802ec20fd6ee59038aa5d0b49c064e06a9e260a0
-
SHA256
31864bf157da452bdbfe1fc080dcae73eed265b8ebc90753c636a8378674b9f3
-
SHA512
c5eccfaa724a510a98edd3c2d0c37e91c066542658ac50cb9d37c4b89f6ab04167fdf008686dce23881001d0e64942586fae223a05dbf990d616903e4c7d0d51
-
SSDEEP
3072:mEGh0ohlVOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGflVOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7289CE7A-1876-417b-9CD9-7C9046B2267B}\stubpath = "C:\\Windows\\{7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe" {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA} {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD}\stubpath = "C:\\Windows\\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe" 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D75C8656-C2AB-4a75-A511-0678C237E20D}\stubpath = "C:\\Windows\\{D75C8656-C2AB-4a75-A511-0678C237E20D}.exe" {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6533C8C6-776E-4e06-B80F-2846BA2505DD} {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}\stubpath = "C:\\Windows\\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe" {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{54AD42A1-31EA-461c-94B9-D434745F82E9} {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6533C8C6-776E-4e06-B80F-2846BA2505DD}\stubpath = "C:\\Windows\\{6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe" {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}\stubpath = "C:\\Windows\\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe" {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0052EF3A-1BE7-4930-8AF0-111E931B78FF}\stubpath = "C:\\Windows\\{0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe" {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6713AC9-D320-4217-B760-32E667D7F35B}\stubpath = "C:\\Windows\\{B6713AC9-D320-4217-B760-32E667D7F35B}.exe" {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9FEDA379-A227-4f77-8DF0-3B5EC579711D}\stubpath = "C:\\Windows\\{9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe" {B6713AC9-D320-4217-B760-32E667D7F35B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D75C8656-C2AB-4a75-A511-0678C237E20D} {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2} {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}\stubpath = "C:\\Windows\\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exe" {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0052EF3A-1BE7-4930-8AF0-111E931B78FF} {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6713AC9-D320-4217-B760-32E667D7F35B} {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{54AD42A1-31EA-461c-94B9-D434745F82E9}\stubpath = "C:\\Windows\\{54AD42A1-31EA-461c-94B9-D434745F82E9}.exe" {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409} {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}\stubpath = "C:\\Windows\\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe" {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD} 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9FEDA379-A227-4f77-8DF0-3B5EC579711D} {B6713AC9-D320-4217-B760-32E667D7F35B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3} {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7289CE7A-1876-417b-9CD9-7C9046B2267B} {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe -
Executes dropped EXE 12 IoCs
pid Process 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe 2288 {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe 3688 {45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe File created C:\Windows\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe File created C:\Windows\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe File created C:\Windows\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exe {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe File created C:\Windows\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe File created C:\Windows\{0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe File created C:\Windows\{D75C8656-C2AB-4a75-A511-0678C237E20D}.exe {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe File created C:\Windows\{54AD42A1-31EA-461c-94B9-D434745F82E9}.exe {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe File created C:\Windows\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe File created C:\Windows\{7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe File created C:\Windows\{B6713AC9-D320-4217-B760-32E667D7F35B}.exe {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe File created C:\Windows\{9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe {B6713AC9-D320-4217-B760-32E667D7F35B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6713AC9-D320-4217-B760-32E667D7F35B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe Token: SeIncBasePriorityPrivilege 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe Token: SeIncBasePriorityPrivilege 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe Token: SeIncBasePriorityPrivilege 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe Token: SeIncBasePriorityPrivilege 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe Token: SeIncBasePriorityPrivilege 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe Token: SeIncBasePriorityPrivilege 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe Token: SeIncBasePriorityPrivilege 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe Token: SeIncBasePriorityPrivilege 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe Token: SeIncBasePriorityPrivilege 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe Token: SeIncBasePriorityPrivilege 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe Token: SeIncBasePriorityPrivilege 2288 {87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2468 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 89 PID 4936 wrote to memory of 2468 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 89 PID 4936 wrote to memory of 2468 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 89 PID 4936 wrote to memory of 2848 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 90 PID 4936 wrote to memory of 2848 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 90 PID 4936 wrote to memory of 2848 4936 2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe 90 PID 2468 wrote to memory of 3168 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 91 PID 2468 wrote to memory of 3168 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 91 PID 2468 wrote to memory of 3168 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 91 PID 2468 wrote to memory of 2424 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 92 PID 2468 wrote to memory of 2424 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 92 PID 2468 wrote to memory of 2424 2468 {BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe 92 PID 3168 wrote to memory of 4616 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 95 PID 3168 wrote to memory of 4616 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 95 PID 3168 wrote to memory of 4616 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 95 PID 3168 wrote to memory of 2764 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 96 PID 3168 wrote to memory of 2764 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 96 PID 3168 wrote to memory of 2764 3168 {0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe 96 PID 4616 wrote to memory of 2964 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 97 PID 4616 wrote to memory of 2964 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 97 PID 4616 wrote to memory of 2964 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 97 PID 4616 wrote to memory of 1492 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 98 PID 4616 wrote to memory of 1492 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 98 PID 4616 wrote to memory of 1492 4616 {B6713AC9-D320-4217-B760-32E667D7F35B}.exe 98 PID 2964 wrote to memory of 4468 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 99 PID 2964 wrote to memory of 4468 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 99 PID 2964 wrote to memory of 4468 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 99 PID 2964 wrote to memory of 392 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 100 PID 2964 wrote to memory of 392 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 100 PID 2964 wrote to memory of 392 2964 {9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe 100 PID 4468 wrote to memory of 2896 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 101 PID 4468 wrote to memory of 2896 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 101 PID 4468 wrote to memory of 2896 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 101 PID 4468 wrote to memory of 1476 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 102 PID 4468 wrote to memory of 1476 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 102 PID 4468 wrote to memory of 1476 4468 {D75C8656-C2AB-4a75-A511-0678C237E20D}.exe 102 PID 2896 wrote to memory of 1488 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 103 PID 2896 wrote to memory of 1488 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 103 PID 2896 wrote to memory of 1488 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 103 PID 2896 wrote to memory of 1720 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 104 PID 2896 wrote to memory of 1720 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 104 PID 2896 wrote to memory of 1720 2896 {54AD42A1-31EA-461c-94B9-D434745F82E9}.exe 104 PID 1488 wrote to memory of 3208 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 105 PID 1488 wrote to memory of 3208 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 105 PID 1488 wrote to memory of 3208 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 105 PID 1488 wrote to memory of 1240 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 106 PID 1488 wrote to memory of 1240 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 106 PID 1488 wrote to memory of 1240 1488 {6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe 106 PID 3208 wrote to memory of 1976 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 107 PID 3208 wrote to memory of 1976 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 107 PID 3208 wrote to memory of 1976 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 107 PID 3208 wrote to memory of 4940 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 108 PID 3208 wrote to memory of 4940 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 108 PID 3208 wrote to memory of 4940 3208 {46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe 108 PID 1976 wrote to memory of 4464 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 109 PID 1976 wrote to memory of 4464 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 109 PID 1976 wrote to memory of 4464 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 109 PID 1976 wrote to memory of 2100 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 110 PID 1976 wrote to memory of 2100 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 110 PID 1976 wrote to memory of 2100 1976 {3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe 110 PID 4464 wrote to memory of 2288 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe 111 PID 4464 wrote to memory of 2288 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe 111 PID 4464 wrote to memory of 2288 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe 111 PID 4464 wrote to memory of 3604 4464 {7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_6e75a3e3ede151baef946c72c10b833f_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exeC:\Windows\{BE203C1B-B35C-46b4-9106-ED49BE7D50BD}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exeC:\Windows\{0052EF3A-1BE7-4930-8AF0-111E931B78FF}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\{B6713AC9-D320-4217-B760-32E667D7F35B}.exeC:\Windows\{B6713AC9-D320-4217-B760-32E667D7F35B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\{9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exeC:\Windows\{9FEDA379-A227-4f77-8DF0-3B5EC579711D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\{D75C8656-C2AB-4a75-A511-0678C237E20D}.exeC:\Windows\{D75C8656-C2AB-4a75-A511-0678C237E20D}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\{54AD42A1-31EA-461c-94B9-D434745F82E9}.exeC:\Windows\{54AD42A1-31EA-461c-94B9-D434745F82E9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{6533C8C6-776E-4e06-B80F-2846BA2505DD}.exeC:\Windows\{6533C8C6-776E-4e06-B80F-2846BA2505DD}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exeC:\Windows\{46D8D0D8-2A3E-4ed5-B5D0-F6340B8A5409}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exeC:\Windows\{3D0B317C-3838-4b8b-8EA3-34E56DE2C1B3}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\{7289CE7A-1876-417b-9CD9-7C9046B2267B}.exeC:\Windows\{7289CE7A-1876-417b-9CD9-7C9046B2267B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exeC:\Windows\{87F7F4AB-7C76-497a-9936-AD5C33BDDBFA}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exeC:\Windows\{45F3CEA4-97C6-40c4-AE86-A17F68E03BB2}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87F7F~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7289C~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D0B3~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{46D8D~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6533C~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{54AD4~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D75C8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9FEDA~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6713~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0052E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BE203~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5f78b34955431deead23eac3584f94fa0
SHA16a00e4ddf7dea74ef850bde9c9dc1ce870a0eec9
SHA2569871efe9e5c5727ed564b142b440c1dfc179765bb9025c649bd5b5fd4aecc490
SHA512f1af3949cca35bfa6fcaa2e9d6cc25524ebc2a5f02f2c6a7cd695eb203fa79d175d31c2759585c9d5efa13d1b93760936bc46de177aab674370223df68c306c9
-
Filesize
344KB
MD58c1dea68f5b4365f44b55846d992b387
SHA175857d231832b266dcd8159839dbc9906dd52df0
SHA25667dbd4eabebf3988b070f9a29179b1cbeaf170bb35447d97f8622a7f5ed40370
SHA51246e6b4db4a1e086d38ef74e785e2e6875b86d091ccda0977ea78f61fab98564d3258d2f2fbb502c610bec0be8eb410663e5e3428f90b6696a008ffdeff849de3
-
Filesize
344KB
MD54b7f479cfce1c315126cf0022582d149
SHA1dea61b8d330aa637fb3864bc7fe6f45c7a1fc7c9
SHA2560009c60edf92d3cb4d985dea043e880cfed1e295c173d709fbe764dd4a94aea9
SHA5120d53c844d54ec60350c854570f678e49bf9e255a05cd4c15ec64016d40a61245ee3b7759e46ffa13907ba897da6c7bb62d3a829a325070fe3f308ea1b43f24a1
-
Filesize
344KB
MD5705bd9aac214f030909f6c1ab1fcb4c6
SHA1284a287290a17dbf73c2058649e5c5f5db7e99c2
SHA256e40659287c85866b366fe9d14ce241bc0e89713e5837b5e5baa2a6e2425b3562
SHA51282358b2247caba939c719e1ecbde9bd04ef16b8e9de2bceb925389b970cab7114ee8ca8652b115f69a8e48091e6401dc3a4c7bc516db6496859b0981a87c5819
-
Filesize
344KB
MD58c3d8af752ae836987c63ed97ef81846
SHA19deca414e27e8f888957afb2a3da7c581738ef04
SHA256a20cbafb0db7e5896ca0f2d2248857ff2549008de260e9426c17fa7821ba331b
SHA512138d154b36c665de24fd7c0f6bf32f8f4ad917b596252373d57c484f5da2174497ae3f59af69e1862ceea631d241100a6161bb50eba4e8edfb0f11977a993262
-
Filesize
344KB
MD551325390af4885f9a4eee7153735d1f9
SHA141d06c150516d4ff19b3639d0324775c3ffb2e40
SHA256666aa5f7fd8f5e0d57ccd3ca38f78ed96d24895508bde7bb727defd47df38dad
SHA5121f4062b3a1039462b0477d65f906483b6a8acd93d7ffaffcf4daff4a350654b3da5545d96912604a3f9a0545706148c61977fb217159bdd98f1d92dfc608e686
-
Filesize
344KB
MD5319ef92e1d7493be873f6f6751237965
SHA1f60b1907a70ceb2f4773609fd42875a9a5964bde
SHA2568a6ae810ff414f0f952c2254235b7ef80ee2f50c2b5e36f45dc98c2d258879d4
SHA512ed6a9f23b8ba64027ed6c7fab44978fa7cf89f94f914718d277d26c406f7009cf2a7e76d7c535ad50d5ce6bb2f5e025647e80c818abb3fc673ccfdd3dc9b3965
-
Filesize
344KB
MD52987d2d11c1fa006a37634dea67ff06f
SHA1b510c4fed321d208241b8c588a9c6581e43fb042
SHA2564184868180c169883073b77ce169f114d4a1690935318934682c19c07e741bd6
SHA512de914b7d9043fb7247304a74a81f8fcfe50f7482e548a3e65a9abf6f64181cc325e0ef1eadbf02b4ab15237a4353f205e72ca455698a478371f527e5f121d396
-
Filesize
344KB
MD5becbb62b5eaf4c13ac24889299ab3171
SHA1345f90e77c8a46135d132769f371dbee82965031
SHA2560b6efdec102ecfd58aca01e3064c93e2998080605a660375aae2a3f4aacda934
SHA5127ce4603edd5b07fc131fb02b33a0a0e8c2c8ec43a64c472fa9a26c6f5d8173181911edd65938d066bb5595dee71b19fca7ece9e847d6c30047b56c94a93910f5
-
Filesize
344KB
MD50590def2538b6507f91da9476270c9e5
SHA114b4064c7600d3cf6a3e1e02303b215625f92833
SHA25697135a91ae14ca347e858c9faa0de10d4405b43bcb8480304b31d3177d148765
SHA512b44c99a0cfff231c2882a671bdbd66122867dd7906b5693327a5f50deff5f51926407117ff928ac8013ab406cec2d2c7b6980f2665154523891b3e76aee74e32
-
Filesize
344KB
MD524e2360cd6e990391a75152bb52d282d
SHA109a137cfcfed01fa6fb4cb85c8c0c6615a30edd5
SHA2567b80b1b4baa5ca2c851fb85930a96543846df2f80e52f0da81fd96a1dabe088f
SHA512cd8101be652bf6654e4a47440e1b4e361c735bdc9e35d9dc1298b0dd3e5e2f77eb6ba435350e963a85b907da57086d5ee5c0cc90faaaf7b4c3a021316b555451
-
Filesize
344KB
MD57efb1a375c38620ecd00e86d41c53f1d
SHA1dc3ec33b9ce0dbdacbcbcc1ca7d360912b5555f1
SHA2564f61e10e8ef6316a28dac69d99f85325835031a945e1eb8a3264c413da9a8604
SHA5128507fda2e915f7f9eaeb9b86b8a455a9dace85c83e6ded7feb7e869adc5073c2f53bbbad6f4e8b0418ae07ab23749e072f4fec9ff5674e6fc7fce1c5db5073a9