Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe
-
Size
380KB
-
MD5
fd1441d9179581a63cec50659e4b2665
-
SHA1
14b065f52946c65bf2ac43db5990bc964bc71554
-
SHA256
56e02b5fa11e81e31378ddb4e0b63db656b7bb647fa16b7384437ee2eaf1af39
-
SHA512
1eedbc17afc8f31177b2096a6aaba3235fb49b5cfd5176d3e86b72c1ce2c193ab0d6fb8f9b3dbae6181565e7ec4765881c386e65b0f8aaa35a84319d314f9085
-
SSDEEP
3072:mEGh0oDlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEG5l7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A756ED5A-41A0-4ba4-8B23-61E91C824702}\stubpath = "C:\\Windows\\{A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe" {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB8A188B-6578-4b11-A618-C408F122D32B} {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}\stubpath = "C:\\Windows\\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe" {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9727A12-6135-44be-B55A-5664C130A209} {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9727A12-6135-44be-B55A-5664C130A209}\stubpath = "C:\\Windows\\{D9727A12-6135-44be-B55A-5664C130A209}.exe" {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{518D9811-977F-45df-88D1-DB3C8E9620C4} {D9727A12-6135-44be-B55A-5664C130A209}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B771F05-7590-4b3a-9E46-FCCEB1442635}\stubpath = "C:\\Windows\\{8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe" 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A756ED5A-41A0-4ba4-8B23-61E91C824702} {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2}\stubpath = "C:\\Windows\\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe" {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6} {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{518D9811-977F-45df-88D1-DB3C8E9620C4}\stubpath = "C:\\Windows\\{518D9811-977F-45df-88D1-DB3C8E9620C4}.exe" {D9727A12-6135-44be-B55A-5664C130A209}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF97B22C-9B04-4d4e-8746-80068F67C292}\stubpath = "C:\\Windows\\{EF97B22C-9B04-4d4e-8746-80068F67C292}.exe" {CB8A188B-6578-4b11-A618-C408F122D32B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2} {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF97B22C-9B04-4d4e-8746-80068F67C292} {CB8A188B-6578-4b11-A618-C408F122D32B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}\stubpath = "C:\\Windows\\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe" {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52A08662-4E09-4a74-AFCD-B1799889C30F}\stubpath = "C:\\Windows\\{52A08662-4E09-4a74-AFCD-B1799889C30F}.exe" {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B771F05-7590-4b3a-9E46-FCCEB1442635} 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CB8A188B-6578-4b11-A618-C408F122D32B}\stubpath = "C:\\Windows\\{CB8A188B-6578-4b11-A618-C408F122D32B}.exe" {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE} {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52A08662-4E09-4a74-AFCD-B1799889C30F} {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1979BA36-6F75-44ec-A6BC-E5E73C35A649} {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1979BA36-6F75-44ec-A6BC-E5E73C35A649}\stubpath = "C:\\Windows\\{1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe" {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 1648 {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe 1960 {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe 2160 {D9727A12-6135-44be-B55A-5664C130A209}.exe 2104 {518D9811-977F-45df-88D1-DB3C8E9620C4}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{52A08662-4E09-4a74-AFCD-B1799889C30F}.exe {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe File created C:\Windows\{8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe File created C:\Windows\{A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe File created C:\Windows\{EF97B22C-9B04-4d4e-8746-80068F67C292}.exe {CB8A188B-6578-4b11-A618-C408F122D32B}.exe File created C:\Windows\{1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe File created C:\Windows\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe File created C:\Windows\{CB8A188B-6578-4b11-A618-C408F122D32B}.exe {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe File created C:\Windows\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe File created C:\Windows\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe File created C:\Windows\{D9727A12-6135-44be-B55A-5664C130A209}.exe {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe File created C:\Windows\{518D9811-977F-45df-88D1-DB3C8E9620C4}.exe {D9727A12-6135-44be-B55A-5664C130A209}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CB8A188B-6578-4b11-A618-C408F122D32B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D9727A12-6135-44be-B55A-5664C130A209}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {518D9811-977F-45df-88D1-DB3C8E9620C4}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe Token: SeIncBasePriorityPrivilege 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe Token: SeIncBasePriorityPrivilege 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe Token: SeIncBasePriorityPrivilege 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe Token: SeIncBasePriorityPrivilege 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe Token: SeIncBasePriorityPrivilege 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe Token: SeIncBasePriorityPrivilege 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe Token: SeIncBasePriorityPrivilege 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe Token: SeIncBasePriorityPrivilege 1648 {71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe Token: SeIncBasePriorityPrivilege 1960 {52A08662-4E09-4a74-AFCD-B1799889C30F}.exe Token: SeIncBasePriorityPrivilege 2160 {D9727A12-6135-44be-B55A-5664C130A209}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 2560 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 30 PID 792 wrote to memory of 2560 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 30 PID 792 wrote to memory of 2560 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 30 PID 792 wrote to memory of 2560 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 30 PID 792 wrote to memory of 2564 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 31 PID 792 wrote to memory of 2564 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 31 PID 792 wrote to memory of 2564 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 31 PID 792 wrote to memory of 2564 792 2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe 31 PID 2560 wrote to memory of 2956 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 32 PID 2560 wrote to memory of 2956 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 32 PID 2560 wrote to memory of 2956 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 32 PID 2560 wrote to memory of 2956 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 32 PID 2560 wrote to memory of 2804 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 33 PID 2560 wrote to memory of 2804 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 33 PID 2560 wrote to memory of 2804 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 33 PID 2560 wrote to memory of 2804 2560 {8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe 33 PID 2956 wrote to memory of 2716 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 34 PID 2956 wrote to memory of 2716 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 34 PID 2956 wrote to memory of 2716 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 34 PID 2956 wrote to memory of 2716 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 34 PID 2956 wrote to memory of 2672 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 35 PID 2956 wrote to memory of 2672 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 35 PID 2956 wrote to memory of 2672 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 35 PID 2956 wrote to memory of 2672 2956 {A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe 35 PID 2716 wrote to memory of 2188 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 36 PID 2716 wrote to memory of 2188 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 36 PID 2716 wrote to memory of 2188 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 36 PID 2716 wrote to memory of 2188 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 36 PID 2716 wrote to memory of 1924 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 37 PID 2716 wrote to memory of 1924 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 37 PID 2716 wrote to memory of 1924 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 37 PID 2716 wrote to memory of 1924 2716 {CB8A188B-6578-4b11-A618-C408F122D32B}.exe 37 PID 2188 wrote to memory of 2556 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 38 PID 2188 wrote to memory of 2556 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 38 PID 2188 wrote to memory of 2556 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 38 PID 2188 wrote to memory of 2556 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 38 PID 2188 wrote to memory of 2624 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 39 PID 2188 wrote to memory of 2624 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 39 PID 2188 wrote to memory of 2624 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 39 PID 2188 wrote to memory of 2624 2188 {EF97B22C-9B04-4d4e-8746-80068F67C292}.exe 39 PID 2556 wrote to memory of 2900 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 40 PID 2556 wrote to memory of 2900 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 40 PID 2556 wrote to memory of 2900 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 40 PID 2556 wrote to memory of 2900 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 40 PID 2556 wrote to memory of 2280 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 41 PID 2556 wrote to memory of 2280 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 41 PID 2556 wrote to memory of 2280 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 41 PID 2556 wrote to memory of 2280 2556 {1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe 41 PID 2900 wrote to memory of 1480 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 42 PID 2900 wrote to memory of 1480 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 42 PID 2900 wrote to memory of 1480 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 42 PID 2900 wrote to memory of 1480 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 42 PID 2900 wrote to memory of 3028 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 43 PID 2900 wrote to memory of 3028 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 43 PID 2900 wrote to memory of 3028 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 43 PID 2900 wrote to memory of 3028 2900 {8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe 43 PID 1480 wrote to memory of 1648 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 44 PID 1480 wrote to memory of 1648 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 44 PID 1480 wrote to memory of 1648 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 44 PID 1480 wrote to memory of 1648 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 44 PID 1480 wrote to memory of 300 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 45 PID 1480 wrote to memory of 300 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 45 PID 1480 wrote to memory of 300 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 45 PID 1480 wrote to memory of 300 1480 {2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-03_fd1441d9179581a63cec50659e4b2665_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\{8B771F05-7590-4b3a-9E46-FCCEB1442635}.exeC:\Windows\{8B771F05-7590-4b3a-9E46-FCCEB1442635}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{A756ED5A-41A0-4ba4-8B23-61E91C824702}.exeC:\Windows\{A756ED5A-41A0-4ba4-8B23-61E91C824702}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\{CB8A188B-6578-4b11-A618-C408F122D32B}.exeC:\Windows\{CB8A188B-6578-4b11-A618-C408F122D32B}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\{EF97B22C-9B04-4d4e-8746-80068F67C292}.exeC:\Windows\{EF97B22C-9B04-4d4e-8746-80068F67C292}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\{1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exeC:\Windows\{1979BA36-6F75-44ec-A6BC-E5E73C35A649}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exeC:\Windows\{8021CD09-749C-4086-BB57-5B7C8B4C3BB2}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exeC:\Windows\{2EE2E901-DFC9-403a-A4B1-0DCA18B9A6E6}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exeC:\Windows\{71246C07-DEA0-4a6e-B69E-DD26B1D6C5DE}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\{52A08662-4E09-4a74-AFCD-B1799889C30F}.exeC:\Windows\{52A08662-4E09-4a74-AFCD-B1799889C30F}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\{D9727A12-6135-44be-B55A-5664C130A209}.exeC:\Windows\{D9727A12-6135-44be-B55A-5664C130A209}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\{518D9811-977F-45df-88D1-DB3C8E9620C4}.exeC:\Windows\{518D9811-977F-45df-88D1-DB3C8E9620C4}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D9727~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{52A08~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71246~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2EE2E~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8021C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1979B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF97B~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB8A1~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A756E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B771~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5c9abe3b339d60e9724c94e0d29a09863
SHA11ad94fdbc3ec4ccb924011992ffb8ed724400aa4
SHA256bf8ced0a7e962cccb5cfdd049b9ffd1d15856ac27ee24f2f8b4968bcb8302b12
SHA512528c856695e214c290a52ca794d94a3401d52d824c06594076b2bcdbbf97f97548518254088cdabfb64813579a9a099f2977fc77ed62940efb2f48f518dae112
-
Filesize
380KB
MD57f8351312eef2f936de3e2a0202a5414
SHA1fa4a97ed55824a8f49ad87a35fd415e2e16ac6fd
SHA256aec5ca21eb841bba32728786d71cc8879a7eefa5dea8502dbbc99712549d538e
SHA5125eef1a2de4fd628d16981f43484184f4ed9422020148ace1b5af4c993c6f7114680190cf0d4b783f269cd499cfa19f3d0057b04324b7e49efde6f61999c6fa9c
-
Filesize
380KB
MD5cd3be76230392f44481fd644ca1b7537
SHA1e1939388b4fb7bf89896e6b12a018746a940a58c
SHA2566df450db1f52e2ab549b060354e8376be73a004a0b61c537d097ef939694186a
SHA51281b60ac140eb8c63659267102938cfdfa7adc943dd498744b55eec360b3b77c8bfc558c9fd7e43a61480aa3f3ee45e0f2409020af212a306a32ab7b3d63086e0
-
Filesize
380KB
MD5b6e2d83bca0a2aa470f1afefd61f3158
SHA12c89ac786ac150a6cc1bf1c34c12f8bc83dea6a8
SHA256f0b09d54acef920f53bcd7b22239d6b9bf5635f244638f0d7ed0b1473dcbdc30
SHA51229dd0794bcad50ac26cf6af4e299b9b7c692e30f78cec7d5d4e720450cecaf016e4bdb44b0ec895e8007ea8beae307fd141a4c92ee65f3d6df71702837258915
-
Filesize
380KB
MD59767dcb401d4a7edbbe87be7b3a3d794
SHA1d5a3722f23289538153cf574a1e87b13b3b3eaaa
SHA256a72b02c39b1ff9b4fba3e649a98e4700cf5ceb61f3c27f5aae4e9fd1e0cc4d6d
SHA51270ee2f45a078378336c3fed2fa42989ace97b2b6f288decb3dad302e98ceb788d380961361f75d6c3988c24ef79a98b83871aa3f7582a3926d869f50c636983d
-
Filesize
380KB
MD5b414ad9dc67ae10debe2751344277599
SHA1455efe3bb3a578e597196f271c2139308a5857f4
SHA256aea2a939b20137165eebb9892367709a2c6a9d5c8a25a154f46d1473bf628b0e
SHA51281f42ba8b4c5fab14fa37b7fbbaf6a92803f81d5c3e17decc7b8813385151d75d1873951ea87802b8fd4bf6c3b58a596c952546fa3702c7d7709d1ef1eead59b
-
Filesize
380KB
MD516c8fea212078f0328b9126f098f4020
SHA191513839dbaf3f6c0deb9be09fdc39fac56a29c2
SHA256eb5758c5ccc827fd6f3dffb102d14b876994b6257b690f8212d0e07e8ebdcad0
SHA512d9dc53bf132a4809ed4001a3c7b3f546f1f997b26e631053206d623f18fa3fd3d169fba468c28644d56fcc6a5fa6ad5506aa16ab892662082d2c56f10b5f064c
-
Filesize
380KB
MD5b412b12438694f8a7900db7b550a4db3
SHA136c39b5ea2566b5c50561fac1062793270978b6e
SHA25605b96a0f7f1d368c5554c1797f7c39397db5d7a7a54360468072b7da76f40ea7
SHA512e8c214ab4f18bd0439ffd87378c8a1df6f68d97a50e85be11a797812879ad9735d2895e46bbe9ecd18697ab9878ef77da0aa0b3ffca87f4ee46edd0a8a871414
-
Filesize
380KB
MD5b22d37c0f7c0dcf807a4dcfc9f2c3767
SHA127a7df95428caa9c41e9dcaa4173e076f65070b9
SHA2562d82fc108118f5908dc797d0c27277c3654bed2aca7bfdcdfc824807f0fa1355
SHA5129364e6b62dc247e2021a4d5a4aeebf6e42c8a11a81c6ee81d187cb7d27074ca6d9c55bec47ace526c14fa53dad61a31a073dd4c04be4264d75211561fd2ea8a5
-
Filesize
380KB
MD5f8581b03ea7804d454b2594004098147
SHA17cd250565db64999cdca098aff52b1459bbba0e8
SHA2569d3f98cea2f55a0b1f629d3c4047bc95bca52f8fd42679100d78bfcb0e4c2391
SHA51260b0e651fd2d9b1374d88587c21836b2c1f7abb19ddb6aeb776c78e4fc00010937eeaf8dcadbf959c6b8785f2b03b2b24846ff2fdba37c17c57d0b3d0c4c2fc9
-
Filesize
380KB
MD5f0463a017a556ef1ddda8f7da5920c60
SHA1bd2d3dee361bb4f6d6c296691022d075ea643a27
SHA256f92a96f7421018d9b8bfa5a25581f63ad4fac66a09439750c92201371cff4ef5
SHA51272600335d42d8abf4e1a1f4aee140da2aff1481734eaf2a593374a62ebf70b5aa613135e564be00c24b99502f8bc9316d038c4abed3529ffd9a674e0fcba61fd