Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe
-
Size
180KB
-
MD5
8b953551a67085ad3e3577bda919d261
-
SHA1
33a1a4f3e8d1f4dc59062ccb90abeef4b7ca2221
-
SHA256
491b134f035deab9259b8082eb1a263775bbbaf902581f81d534cbc67ebf759f
-
SHA512
f56dc91223f001d756a8eaea02a3859e2663f76c8f6b70868974eacf37bcd618aa6b5204b72ba962d115e7e1de1cfe8fced6f27203a667e208772cf2b24652ba
-
SSDEEP
3072:jEGh0oulfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG4l5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}\stubpath = "C:\\Windows\\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe" {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9861CE3-758A-41ba-A879-EFA661FE7EA1}\stubpath = "C:\\Windows\\{B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe" {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9943AE24-E695-4901-BF0E-313A4BCE6A2D} {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF24870F-053A-418b-BB22-E3F87E0F8DD1} {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9670AB38-8667-4bac-91AF-B17E5DDF8A51}\stubpath = "C:\\Windows\\{9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe" {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70} {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}\stubpath = "C:\\Windows\\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe" {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64}\stubpath = "C:\\Windows\\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe" {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}\stubpath = "C:\\Windows\\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exe" {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6442B4F0-DD5D-448f-954C-209FD9DEA812} 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4873E50-3051-46e7-9BED-81D38BB6C23C} {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9670AB38-8667-4bac-91AF-B17E5DDF8A51} {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64} {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6442B4F0-DD5D-448f-954C-209FD9DEA812}\stubpath = "C:\\Windows\\{6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe" 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AF24870F-053A-418b-BB22-E3F87E0F8DD1}\stubpath = "C:\\Windows\\{AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe" {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9861CE3-758A-41ba-A879-EFA661FE7EA1} {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9943AE24-E695-4901-BF0E-313A4BCE6A2D}\stubpath = "C:\\Windows\\{9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe" {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4873E50-3051-46e7-9BED-81D38BB6C23C}\stubpath = "C:\\Windows\\{A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe" {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9} {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C} {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C}\stubpath = "C:\\Windows\\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe" {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D} {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe -
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 2168 {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe 2180 {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe 1192 {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe 2312 {5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe File created C:\Windows\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe File created C:\Windows\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe File created C:\Windows\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe File created C:\Windows\{B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe File created C:\Windows\{9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe File created C:\Windows\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe File created C:\Windows\{6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe File created C:\Windows\{AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe File created C:\Windows\{A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe File created C:\Windows\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exe {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe Token: SeIncBasePriorityPrivilege 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe Token: SeIncBasePriorityPrivilege 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe Token: SeIncBasePriorityPrivilege 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe Token: SeIncBasePriorityPrivilege 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe Token: SeIncBasePriorityPrivilege 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe Token: SeIncBasePriorityPrivilege 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe Token: SeIncBasePriorityPrivilege 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe Token: SeIncBasePriorityPrivilege 2168 {B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe Token: SeIncBasePriorityPrivilege 2180 {9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe Token: SeIncBasePriorityPrivilege 1192 {7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2816 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 30 PID 2792 wrote to memory of 2816 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 30 PID 2792 wrote to memory of 2816 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 30 PID 2792 wrote to memory of 2816 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 30 PID 2792 wrote to memory of 2828 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 31 PID 2792 wrote to memory of 2828 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 31 PID 2792 wrote to memory of 2828 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 31 PID 2792 wrote to memory of 2828 2792 2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe 31 PID 2816 wrote to memory of 2540 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 32 PID 2816 wrote to memory of 2540 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 32 PID 2816 wrote to memory of 2540 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 32 PID 2816 wrote to memory of 2540 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 32 PID 2816 wrote to memory of 2596 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 33 PID 2816 wrote to memory of 2596 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 33 PID 2816 wrote to memory of 2596 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 33 PID 2816 wrote to memory of 2596 2816 {6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe 33 PID 2540 wrote to memory of 2468 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 34 PID 2540 wrote to memory of 2468 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 34 PID 2540 wrote to memory of 2468 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 34 PID 2540 wrote to memory of 2468 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 34 PID 2540 wrote to memory of 1276 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 35 PID 2540 wrote to memory of 1276 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 35 PID 2540 wrote to memory of 1276 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 35 PID 2540 wrote to memory of 1276 2540 {AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe 35 PID 2468 wrote to memory of 2208 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 36 PID 2468 wrote to memory of 2208 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 36 PID 2468 wrote to memory of 2208 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 36 PID 2468 wrote to memory of 2208 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 36 PID 2468 wrote to memory of 2052 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 37 PID 2468 wrote to memory of 2052 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 37 PID 2468 wrote to memory of 2052 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 37 PID 2468 wrote to memory of 2052 2468 {A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe 37 PID 2208 wrote to memory of 2040 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 38 PID 2208 wrote to memory of 2040 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 38 PID 2208 wrote to memory of 2040 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 38 PID 2208 wrote to memory of 2040 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 38 PID 2208 wrote to memory of 1256 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 39 PID 2208 wrote to memory of 1256 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 39 PID 2208 wrote to memory of 1256 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 39 PID 2208 wrote to memory of 1256 2208 {9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe 39 PID 2040 wrote to memory of 576 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 40 PID 2040 wrote to memory of 576 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 40 PID 2040 wrote to memory of 576 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 40 PID 2040 wrote to memory of 576 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 40 PID 2040 wrote to memory of 2276 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 41 PID 2040 wrote to memory of 2276 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 41 PID 2040 wrote to memory of 2276 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 41 PID 2040 wrote to memory of 2276 2040 {4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe 41 PID 576 wrote to memory of 2532 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 42 PID 576 wrote to memory of 2532 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 42 PID 576 wrote to memory of 2532 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 42 PID 576 wrote to memory of 2532 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 42 PID 576 wrote to memory of 1568 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 43 PID 576 wrote to memory of 1568 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 43 PID 576 wrote to memory of 1568 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 43 PID 576 wrote to memory of 1568 576 {3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe 43 PID 2532 wrote to memory of 2168 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 45 PID 2532 wrote to memory of 2168 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 45 PID 2532 wrote to memory of 2168 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 45 PID 2532 wrote to memory of 2168 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 45 PID 2532 wrote to memory of 2184 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 46 PID 2532 wrote to memory of 2184 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 46 PID 2532 wrote to memory of 2184 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 46 PID 2532 wrote to memory of 2184 2532 {A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_8b953551a67085ad3e3577bda919d261_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{6442B4F0-DD5D-448f-954C-209FD9DEA812}.exeC:\Windows\{6442B4F0-DD5D-448f-954C-209FD9DEA812}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\{AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exeC:\Windows\{AF24870F-053A-418b-BB22-E3F87E0F8DD1}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\{A4873E50-3051-46e7-9BED-81D38BB6C23C}.exeC:\Windows\{A4873E50-3051-46e7-9BED-81D38BB6C23C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\{9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exeC:\Windows\{9670AB38-8667-4bac-91AF-B17E5DDF8A51}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exeC:\Windows\{4C28BD0C-3B60-4996-8DB9-B0F923BE0F70}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exeC:\Windows\{3F62D84B-F0AD-4bbd-9389-64844D8D8B64}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exeC:\Windows\{A7290220-CB91-4bfb-A7EB-3E2565E0E5B9}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exeC:\Windows\{B9861CE3-758A-41ba-A879-EFA661FE7EA1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Windows\{9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exeC:\Windows\{9943AE24-E695-4901-BF0E-313A4BCE6A2D}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exeC:\Windows\{7BBA8B24-80CD-435c-A5FA-172E8F63F25C}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Windows\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exeC:\Windows\{5868CF5C-5D63-4d8b-8AC1-EF253C0A175D}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7BBA8~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9943A~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B9861~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7290~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F62D~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C28B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9670A~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4873~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF248~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6442B~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD564eac20969475a572129c29779ea4d8e
SHA1878bff7294e4ccba1c272cdad51b5d83ab7b2b54
SHA2561dc0ef489b6205a315ae0560b21238400c21401f66669e431f37657e031d2d38
SHA512f4f07ee070eab01d2025959a5de437a10654414f4c19de9003810b0623de48c7540c662edb983a75e20bbd89dd4a0ac0585a53058e52b8d30e5c26dbe08b8fd6
-
Filesize
180KB
MD54038ab54a33acfb04759f1857d794399
SHA1047308c7e10ab14e3ee4bd36b95b56d5aee08212
SHA25626d081e1349988effdd53cdfd975cbbcebd8d07ca115b1744334bea97a7a3c1f
SHA51277d04d3e05d6cbb5732085356d1f1607ae9f740069488a9b5f73746e3edb8fd0067970b19bead3616aa19ccbd95f407f8b9c7c81e763f90d51ddcac8df8328c4
-
Filesize
180KB
MD511eba98f30bfb5a87fc95ba01c0b0a7d
SHA19db2193d47b0b1f13343cdb4641d39fe5774909c
SHA256f05494f1c0240690d2210151ee4d9ffba25ba78df77c7f162264775b4e2b4d43
SHA512c0e65b1eae48841ac7cf3d4884399faeb6e07c946823f5c7c6e8501a644394815218207e1438054179e043b79014636e1934262c41a70191b791bf91e190b1f5
-
Filesize
180KB
MD58b819903b071f03ddc0ff029f3f8b509
SHA16f8317be84d117cc04a26bf58670324823dc1692
SHA25647cb4e691e5e92c13fb2137973cbda790d066ea209826c8c34357b0f08591ff7
SHA51247a80c2131ece9039a6ed094e593e44f71d03fa7e749755515e4b713e99b895c9cf7bc09b264b12ce9aacbebb6752c281f9f4830669ada3d09326324dcf721d8
-
Filesize
180KB
MD515219e30315cd44eb7947dd46ba08980
SHA10ea7b17caea50c2ad088d2fe07e84b38aa5a6d79
SHA256c2b47b11800ce201ffd721c693ab69a57975888beb2b40822e8177b2f903629a
SHA512b9a9b9f8d2e9e43c1dc29f1963555bd834fe28ffb149c873e061194696f59dcbaf5c4a0334289581510374387b42a51ea20e09da882425a67f4d9d2fa36b54f0
-
Filesize
180KB
MD5590a3bdcb2886c4052897dee3a79ab6b
SHA141555139630a6cf671b0f963ad6d735ed6fb4b5d
SHA256a335fd0b0bd913832955229989da437d3b18cb083ddac59ab76e26630788c592
SHA51251e808cfe5f6d14e5a9e0b87ef31618c6b64945f8bf1da117fda2a1ec921a2539e893624742968ffc3f9dad117a1d9115a1bc8963463914483e39ed4aa04243f
-
Filesize
180KB
MD518be922bfb6a8892adda6266849d2b06
SHA124fe253cf6c5cb994848cdf2dd67b74ee6ead93f
SHA256adb35f570c7134722aab1ac37956a391a830209c3fa7de2e1f1ddeb93335f8d8
SHA5125b8cd13f1fd1683867029cf1a4e94aa8acfc72884e85331f577b4617f167b16dc5dfa4cae323c3506bbc0b25885c9d251f6447e2dbc927c20fd3d45578f18ac6
-
Filesize
180KB
MD5cd805c7b578df1ec82aa0d433c728728
SHA157f8ede874650c7644564e636c9de384af5c60a7
SHA256c26ebf71bc4779758d5226e95bdbf0d8b694ac5d80a9e4a328132a32ac3aef8d
SHA5125b9ed8f5560588af25ccb65398d09f041cff894a6e335991e2cd6af19dc6b2c2004f2f50aa1a72ad0c6fe1c97bc840ba6a3dbcedf2dc023a225adf51bad57e12
-
Filesize
180KB
MD5c707748ec01ddd1b6cd0fda53f8e6bf2
SHA149a5a4719679b4212e1f35f62d1326f02a38f76f
SHA256d63f35c12e6ef2893c943dde4c98ef4e32447a82ae019767bac1b4c682b170f5
SHA5124c37d20417c07408efa2fe031991b5e368508d9dfb1c0f0ca5ac79343805141d6f81a7c1872b6dcc47ee1090cca58a3857bea34c280c1edec9b871f806c4e1a6
-
Filesize
180KB
MD5fecd453d9dadf25b82eb3f7d2e65a2bd
SHA1dc86d9addecfdf7d1d9091a5ac6f219ba8238dd2
SHA256f1448319eabbc2a687e760288fa721ea1b787f1f51238453147730bcce72b5f5
SHA51244982c935932aa4fa66a702bbd16987675325b9a7fd8fee288d0c35f700f597151a5216e51dd889001434a18eb318802161a447a17f92b84196e33289649c851
-
Filesize
180KB
MD5ae88a940549f4c017c4c029cbaf588bf
SHA1010f364f061bd88fc9ce1ce94e0f5332b2297897
SHA256abc632acaebf7002dbb8474b6af2663c3937f9ca0276baec975a440ceb70115d
SHA512d2b4921e976fdb32588fe09b2989969b61e432ecfec03c6a0652ff24aba57072e77ad29e9ce9d151eeec140327ba402daf437fc18d77f6203f56f97f3c49c4a8