Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe
-
Size
197KB
-
MD5
99c30ea3210c009ee8810dff4e63cf9f
-
SHA1
26b51f2e0de933860e38d58952a4844cfcd0eaee
-
SHA256
7bcad27b998ac2f43d5332c7bce9ec35c8d44f0d33828c3e765b2044da6ba35c
-
SHA512
c38c9f8d2c8b9a3157cfd4b2847b956a05bad042a7cf8e24687e871c604f39f8d357833e5cf4c1e92c500e363a500fc7682a6893b6145da6005a8de1a65d2334
-
SSDEEP
3072:jEGh0oXl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGFlEeKcAEca
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CACE1F96-97C2-4e5e-8B9B-787530871802} {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A784BD-8BFC-447e-B347-0607CF68D090} {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7972125D-8C89-4850-94CC-5ACF0BACB077} {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7972125D-8C89-4850-94CC-5ACF0BACB077}\stubpath = "C:\\Windows\\{7972125D-8C89-4850-94CC-5ACF0BACB077}.exe" {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}\stubpath = "C:\\Windows\\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe" {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}\stubpath = "C:\\Windows\\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe" {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{076CD7C5-1C55-4644-A084-636B3EE3A08B}\stubpath = "C:\\Windows\\{076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe" {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A} {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{157E260A-0351-42ba-AFDE-A5C449044FDC} {57A784BD-8BFC-447e-B347-0607CF68D090}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{157E260A-0351-42ba-AFDE-A5C449044FDC}\stubpath = "C:\\Windows\\{157E260A-0351-42ba-AFDE-A5C449044FDC}.exe" {57A784BD-8BFC-447e-B347-0607CF68D090}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C12E681-D485-4359-A733-DCF7D54BA6E9}\stubpath = "C:\\Windows\\{3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe" 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A5620E9-59AD-454b-BA9F-692910FBD9E8}\stubpath = "C:\\Windows\\{7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe" {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{076CD7C5-1C55-4644-A084-636B3EE3A08B} {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A}\stubpath = "C:\\Windows\\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe" {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CACE1F96-97C2-4e5e-8B9B-787530871802}\stubpath = "C:\\Windows\\{CACE1F96-97C2-4e5e-8B9B-787530871802}.exe" {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57A784BD-8BFC-447e-B347-0607CF68D090}\stubpath = "C:\\Windows\\{57A784BD-8BFC-447e-B347-0607CF68D090}.exe" {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0821665-1E46-48e0-B0BB-E5A8142F57F0} {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0821665-1E46-48e0-B0BB-E5A8142F57F0}\stubpath = "C:\\Windows\\{D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe" {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA} {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8} {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52} {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}\stubpath = "C:\\Windows\\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exe" {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C12E681-D485-4359-A733-DCF7D54BA6E9} 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A5620E9-59AD-454b-BA9F-692910FBD9E8} {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe -
Executes dropped EXE 12 IoCs
pid Process 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe 2692 {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe 4500 {522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{57A784BD-8BFC-447e-B347-0607CF68D090}.exe {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe File created C:\Windows\{7972125D-8C89-4850-94CC-5ACF0BACB077}.exe {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe File created C:\Windows\{D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe File created C:\Windows\{7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe File created C:\Windows\{076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe File created C:\Windows\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe File created C:\Windows\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe File created C:\Windows\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe File created C:\Windows\{3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe File created C:\Windows\{CACE1F96-97C2-4e5e-8B9B-787530871802}.exe {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe File created C:\Windows\{157E260A-0351-42ba-AFDE-A5C449044FDC}.exe {57A784BD-8BFC-447e-B347-0607CF68D090}.exe File created C:\Windows\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exe {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {57A784BD-8BFC-447e-B347-0607CF68D090}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe Token: SeIncBasePriorityPrivilege 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe Token: SeIncBasePriorityPrivilege 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe Token: SeIncBasePriorityPrivilege 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe Token: SeIncBasePriorityPrivilege 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe Token: SeIncBasePriorityPrivilege 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe Token: SeIncBasePriorityPrivilege 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe Token: SeIncBasePriorityPrivilege 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe Token: SeIncBasePriorityPrivilege 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe Token: SeIncBasePriorityPrivilege 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe Token: SeIncBasePriorityPrivilege 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe Token: SeIncBasePriorityPrivilege 2692 {7972125D-8C89-4850-94CC-5ACF0BACB077}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4064 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 82 PID 4040 wrote to memory of 4064 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 82 PID 4040 wrote to memory of 4064 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 82 PID 4040 wrote to memory of 2892 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 83 PID 4040 wrote to memory of 2892 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 83 PID 4040 wrote to memory of 2892 4040 2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe 83 PID 4064 wrote to memory of 3952 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 91 PID 4064 wrote to memory of 3952 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 91 PID 4064 wrote to memory of 3952 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 91 PID 4064 wrote to memory of 2876 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 92 PID 4064 wrote to memory of 2876 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 92 PID 4064 wrote to memory of 2876 4064 {3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe 92 PID 3952 wrote to memory of 1188 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 94 PID 3952 wrote to memory of 1188 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 94 PID 3952 wrote to memory of 1188 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 94 PID 3952 wrote to memory of 4420 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 95 PID 3952 wrote to memory of 4420 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 95 PID 3952 wrote to memory of 4420 3952 {D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe 95 PID 1188 wrote to memory of 2684 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 97 PID 1188 wrote to memory of 2684 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 97 PID 1188 wrote to memory of 2684 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 97 PID 1188 wrote to memory of 2836 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 98 PID 1188 wrote to memory of 2836 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 98 PID 1188 wrote to memory of 2836 1188 {7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe 98 PID 2684 wrote to memory of 2072 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 99 PID 2684 wrote to memory of 2072 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 99 PID 2684 wrote to memory of 2072 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 99 PID 2684 wrote to memory of 1008 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 100 PID 2684 wrote to memory of 1008 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 100 PID 2684 wrote to memory of 1008 2684 {076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe 100 PID 2072 wrote to memory of 1880 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 101 PID 2072 wrote to memory of 1880 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 101 PID 2072 wrote to memory of 1880 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 101 PID 2072 wrote to memory of 1388 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 102 PID 2072 wrote to memory of 1388 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 102 PID 2072 wrote to memory of 1388 2072 {0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe 102 PID 1880 wrote to memory of 344 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 103 PID 1880 wrote to memory of 344 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 103 PID 1880 wrote to memory of 344 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 103 PID 1880 wrote to memory of 2000 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 104 PID 1880 wrote to memory of 2000 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 104 PID 1880 wrote to memory of 2000 1880 {FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe 104 PID 344 wrote to memory of 3868 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 105 PID 344 wrote to memory of 3868 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 105 PID 344 wrote to memory of 3868 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 105 PID 344 wrote to memory of 2972 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 106 PID 344 wrote to memory of 2972 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 106 PID 344 wrote to memory of 2972 344 {0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe 106 PID 3868 wrote to memory of 1540 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 107 PID 3868 wrote to memory of 1540 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 107 PID 3868 wrote to memory of 1540 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 107 PID 3868 wrote to memory of 2808 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 108 PID 3868 wrote to memory of 2808 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 108 PID 3868 wrote to memory of 2808 3868 {CACE1F96-97C2-4e5e-8B9B-787530871802}.exe 108 PID 1540 wrote to memory of 2732 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 109 PID 1540 wrote to memory of 2732 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 109 PID 1540 wrote to memory of 2732 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 109 PID 1540 wrote to memory of 2244 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 110 PID 1540 wrote to memory of 2244 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 110 PID 1540 wrote to memory of 2244 1540 {57A784BD-8BFC-447e-B347-0607CF68D090}.exe 110 PID 2732 wrote to memory of 2692 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe 111 PID 2732 wrote to memory of 2692 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe 111 PID 2732 wrote to memory of 2692 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe 111 PID 2732 wrote to memory of 1760 2732 {157E260A-0351-42ba-AFDE-A5C449044FDC}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_99c30ea3210c009ee8810dff4e63cf9f_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\{3C12E681-D485-4359-A733-DCF7D54BA6E9}.exeC:\Windows\{3C12E681-D485-4359-A733-DCF7D54BA6E9}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\{D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exeC:\Windows\{D0821665-1E46-48e0-B0BB-E5A8142F57F0}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\{7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exeC:\Windows\{7A5620E9-59AD-454b-BA9F-692910FBD9E8}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\{076CD7C5-1C55-4644-A084-636B3EE3A08B}.exeC:\Windows\{076CD7C5-1C55-4644-A084-636B3EE3A08B}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exeC:\Windows\{0F9E21CF-56BB-4bdb-A4AC-6C17CC27EEFA}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exeC:\Windows\{FD08BBA2-7E48-4d15-ADEA-3F9711269BE8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exeC:\Windows\{0A6A65A6-8B36-4d4b-B971-C155707B9E7A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\{CACE1F96-97C2-4e5e-8B9B-787530871802}.exeC:\Windows\{CACE1F96-97C2-4e5e-8B9B-787530871802}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\{57A784BD-8BFC-447e-B347-0607CF68D090}.exeC:\Windows\{57A784BD-8BFC-447e-B347-0607CF68D090}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\{157E260A-0351-42ba-AFDE-A5C449044FDC}.exeC:\Windows\{157E260A-0351-42ba-AFDE-A5C449044FDC}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\{7972125D-8C89-4850-94CC-5ACF0BACB077}.exeC:\Windows\{7972125D-8C89-4850-94CC-5ACF0BACB077}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exeC:\Windows\{522CDFBD-A162-4de9-8BC9-BCA5E5A7EB52}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79721~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{157E2~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{57A78~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CACE1~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0A6A6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD08B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F9E2~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{076CD~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A562~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D0821~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C12E~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5c626ee855138dae1c6e3cd01af51fe16
SHA1085e0743caac94fe58a60adbe7e4529b68995625
SHA2568544a08f63f8e4dd6bced075919338156b530442b17e17326f8a47b47ef12aac
SHA512a8efbc22e71fa2c2eda20385edc927a329b0bcd9010a302c498e52dfcc8806b83f01051fe0934a1223a1c9d6a344385a8cb06a2d8dc58a0503a2bc1a554071d7
-
Filesize
197KB
MD52820033ac18fceb700dd4f3fa6b5ef9a
SHA114cdbb645c1612793ff3351323ce129f27c44b41
SHA256450fb7a9ba60a8fa62fe5ae97222bf77e096106560fdd4f2d6a23f718375fdd4
SHA51278e1f3d30e8058cbd7cf458aa26e97476de0132d878d2377fc564712fe05e3a19b4f815263fdb19efbaced7688a885e8d7370faaae13423abe2cd72ccfd581ce
-
Filesize
197KB
MD5844bc35b1c7779408320a6f5cd1fc358
SHA19332b368853ed0c68dc6bcc7d7e81f4f1a093c83
SHA25616ebc8697c6736db006dd501d404504e2afd3c70e537b4c8a3bfa37fa6a8b601
SHA512b10c33ebf6a4312c1d9384d8115ed95604197246a374a7c1b199fcdca7be5778bcdebe5b54e2843913cfd20045214d18fa48e3b3c9b1860f196c09a2df74c1e4
-
Filesize
197KB
MD5394470d9217ad5d913d79c6b62c5a1c6
SHA12585fd2604e67db0e42893bf615f6adbae902c7a
SHA2566fde96302a837b3f56d61cf4259ddd876e47bf79b77e262d084432fccf561cc3
SHA51251aa09e4e1792e767811db9206e379a90ec06d39f1cbb7914fdf8f4eed089aec585f31e08dce7c794a76c854f880cf6e05235922ac4d7e28244c7905d1604b73
-
Filesize
197KB
MD544d4c83e89182574a0f099d0ef682c30
SHA1b28b1c73a5585f78ca610c8f67e20d069aa452f4
SHA2561fdf55ad38fc0a5ce71490135bcde100c5ecd335d1fc6ca343cd1635134161e0
SHA51228267f67a0d8dc2288f359015f5d990517f77c7e7e58d1d97c3c147e580f6f447f39ba63da2f22f1536f2691cfa7c20f4b26030b032236d0ab6a832730ab9e56
-
Filesize
197KB
MD5a82a11ca1bd7272704fd5ff3208af324
SHA112ee2902beb3b6a97136030fff1e074b1e8f4c46
SHA25611db89172e5591f5eea15a9770083622dff798cb9f3a4821939be2f5d34b8dc7
SHA5121ad92cb7750f9e67f71eb75b19421d0ba591ce254925c7fe1cedccd2e9ae699e417e7627ea187cca4ebd1a9b35b9cd61494ce8757012c88e998937c8c515e227
-
Filesize
197KB
MD5e8b626c557a74dd96583a4141d300b61
SHA113562718e98aba5bc16356c54f4c1d58b729497b
SHA2563a34eafe9dcbee7e42dbf9e0ad39388e744fcbc38d26964532897db9c746ecc1
SHA512a61a5115c85ccf6f723232b9a466a8ab593f2299da8b7c77c886a68560cb6a839d793d9523ed77724b084282b83fc7ea7ec60633d645da4ca6fd297fc226b510
-
Filesize
197KB
MD5af81997a419eba1a7da709e282fd4891
SHA18d66ce1d24c6547092379d4e806fa174447d6af9
SHA256d0814d4193983d8b7cf6f58bb7e6400a0b67b808cf2b2e3401706094b49ced81
SHA51280507ec31753232302cdc5c4cc2ab50a646b4e01ce8eec4d8f26b23a1a7aed640565758883c40de5b511d3b36bdce3d453f832d48ed0e539e0f3fb7f996347d7
-
Filesize
197KB
MD5c641d96fe9b73d7692857135f4e15666
SHA15a0c4ddf85f8967d66105a7f18c0b104c5116230
SHA256f218067eee421b45df3a0524bb189f35005349abb9d34848f3dd54b7da6532bf
SHA5122e0966d13030711cba25caa21edf22eca84d0339bed2be9ead4570df70e125faa80bfab75429e43ba2aea5e4bfd11837456a61924faddf51a1080074303001da
-
Filesize
197KB
MD54fb624b04d8cd435953e369e56d6ead1
SHA1217eccd616fa637a9ee28f904b01bfd91ac40238
SHA256f67b5ecd38328cb8a66018c0a43a3237addbee98cf714a3bafeccb2ed6d28ba1
SHA512fcf981a41b7e80469e2b0b43eb80363cd957797c90bbe5483dc58ac6f73fbd7d3d6502ace717810e4444e497a4e30a8150ea48d3bf6740066f8892937ccb41e7
-
Filesize
197KB
MD533ec25dbdeea9287692b807857396f26
SHA1441d370c6014dbdda250d5753d6dce69403b0843
SHA256f6478c757197351258ab8fc3d491db0fe719e95d8b96f7bbb2609a80969fc99e
SHA5129e7a7fcb44197b6bd7c77c8f39801f6b96e4dbfbf8b436073a38ac395e48bc99ebc79538da777c5d085cd06d3baf15690133bcfe6b00a652e2585e87c051ebd6
-
Filesize
197KB
MD5665981628f0ae404d7cfa2e1ca37fee5
SHA13b5827dff6a362588d1323d4e5c333ce3d30b7c9
SHA256382c116a62f3ff33192707a60e2b16c5ce31daecf956be34b73fc4f327bd585d
SHA51291782f0f0fc379ee0832e01f5c3eda3b5a62ac8896820448a681689b8ca3b10bc10ea595fc6f21a20f6bd97198e8e996ea3705453b37743677e7f6a8c548fd88