Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
-
Size
372KB
-
MD5
ad96f850339386bceb93b2f2d744a9c9
-
SHA1
42ba679a7ef9b200e97042036d2d35243c44a3c2
-
SHA256
8a19c5d2550e57284eea3e573df7248b3ec8c13da96d1d60176fff1ccdf2e00d
-
SHA512
69f973d30cd4d70521980dc89abd16ed3422b190e6b0e1144759b16b97450bb744cfe0dca82690a0b7067c8e36758033b24880c520e12fef2b00a536ae9ff848
-
SSDEEP
3072:CEGh0oxlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGnlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D} {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9070ABE8-9006-4842-B992-DFDC258276A6} {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F877F513-4616-495c-A8A7-D92D752DE49E}\stubpath = "C:\\Windows\\{F877F513-4616-495c-A8A7-D92D752DE49E}.exe" {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4102076C-B806-4207-A519-405DC51E0166} {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9070ABE8-9006-4842-B992-DFDC258276A6}\stubpath = "C:\\Windows\\{9070ABE8-9006-4842-B992-DFDC258276A6}.exe" {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006} {9070ABE8-9006-4842-B992-DFDC258276A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECFB1810-F974-4084-814D-CCB85AF64D9A}\stubpath = "C:\\Windows\\{ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe" {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{299B38B6-9B6C-49be-90B6-01C59B1989E8} {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{299B38B6-9B6C-49be-90B6-01C59B1989E8}\stubpath = "C:\\Windows\\{299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe" {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}\stubpath = "C:\\Windows\\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe" {F877F513-4616-495c-A8A7-D92D752DE49E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96} {4102076C-B806-4207-A519-405DC51E0166}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}\stubpath = "C:\\Windows\\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe" {4102076C-B806-4207-A519-405DC51E0166}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D}\stubpath = "C:\\Windows\\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe" {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6} 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECFB1810-F974-4084-814D-CCB85AF64D9A} {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E} {F877F513-4616-495c-A8A7-D92D752DE49E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4102076C-B806-4207-A519-405DC51E0166}\stubpath = "C:\\Windows\\{4102076C-B806-4207-A519-405DC51E0166}.exe" {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F575AD1-6F1E-4ab4-9022-562392E8C241} {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4F575AD1-6F1E-4ab4-9022-562392E8C241}\stubpath = "C:\\Windows\\{4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe" {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}\stubpath = "C:\\Windows\\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exe" {9070ABE8-9006-4842-B992-DFDC258276A6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}\stubpath = "C:\\Windows\\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe" 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F877F513-4616-495c-A8A7-D92D752DE49E} {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe -
Executes dropped EXE 11 IoCs
pid Process 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 824 {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe 2296 {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe 1664 {9070ABE8-9006-4842-B992-DFDC258276A6}.exe 1352 {B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe File created C:\Windows\{299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe File created C:\Windows\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe {F877F513-4616-495c-A8A7-D92D752DE49E}.exe File created C:\Windows\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe File created C:\Windows\{4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe File created C:\Windows\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exe {9070ABE8-9006-4842-B992-DFDC258276A6}.exe File created C:\Windows\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe File created C:\Windows\{4102076C-B806-4207-A519-405DC51E0166}.exe {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe File created C:\Windows\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe {4102076C-B806-4207-A519-405DC51E0166}.exe File created C:\Windows\{9070ABE8-9006-4842-B992-DFDC258276A6}.exe {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe File created C:\Windows\{F877F513-4616-495c-A8A7-D92D752DE49E}.exe {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F877F513-4616-495c-A8A7-D92D752DE49E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4102076C-B806-4207-A519-405DC51E0166}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9070ABE8-9006-4842-B992-DFDC258276A6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Token: SeIncBasePriorityPrivilege 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe Token: SeIncBasePriorityPrivilege 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe Token: SeIncBasePriorityPrivilege 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe Token: SeIncBasePriorityPrivilege 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe Token: SeIncBasePriorityPrivilege 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe Token: SeIncBasePriorityPrivilege 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe Token: SeIncBasePriorityPrivilege 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe Token: SeIncBasePriorityPrivilege 824 {3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe Token: SeIncBasePriorityPrivilege 2296 {4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe Token: SeIncBasePriorityPrivilege 1664 {9070ABE8-9006-4842-B992-DFDC258276A6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2516 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 31 PID 2872 wrote to memory of 2516 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 31 PID 2872 wrote to memory of 2516 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 31 PID 2872 wrote to memory of 2516 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 31 PID 2872 wrote to memory of 3016 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 32 PID 2872 wrote to memory of 3016 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 32 PID 2872 wrote to memory of 3016 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 32 PID 2872 wrote to memory of 3016 2872 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 32 PID 2516 wrote to memory of 812 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 33 PID 2516 wrote to memory of 812 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 33 PID 2516 wrote to memory of 812 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 33 PID 2516 wrote to memory of 812 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 33 PID 2516 wrote to memory of 2692 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 34 PID 2516 wrote to memory of 2692 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 34 PID 2516 wrote to memory of 2692 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 34 PID 2516 wrote to memory of 2692 2516 {8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe 34 PID 812 wrote to memory of 2212 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 35 PID 812 wrote to memory of 2212 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 35 PID 812 wrote to memory of 2212 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 35 PID 812 wrote to memory of 2212 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 35 PID 812 wrote to memory of 2708 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 36 PID 812 wrote to memory of 2708 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 36 PID 812 wrote to memory of 2708 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 36 PID 812 wrote to memory of 2708 812 {ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe 36 PID 2212 wrote to memory of 2156 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 37 PID 2212 wrote to memory of 2156 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 37 PID 2212 wrote to memory of 2156 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 37 PID 2212 wrote to memory of 2156 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 37 PID 2212 wrote to memory of 2660 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 38 PID 2212 wrote to memory of 2660 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 38 PID 2212 wrote to memory of 2660 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 38 PID 2212 wrote to memory of 2660 2212 {299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe 38 PID 2156 wrote to memory of 1312 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 39 PID 2156 wrote to memory of 1312 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 39 PID 2156 wrote to memory of 1312 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 39 PID 2156 wrote to memory of 1312 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 39 PID 2156 wrote to memory of 2596 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 40 PID 2156 wrote to memory of 2596 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 40 PID 2156 wrote to memory of 2596 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 40 PID 2156 wrote to memory of 2596 2156 {F877F513-4616-495c-A8A7-D92D752DE49E}.exe 40 PID 1312 wrote to memory of 2896 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 41 PID 1312 wrote to memory of 2896 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 41 PID 1312 wrote to memory of 2896 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 41 PID 1312 wrote to memory of 2896 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 41 PID 1312 wrote to memory of 2888 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 42 PID 1312 wrote to memory of 2888 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 42 PID 1312 wrote to memory of 2888 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 42 PID 1312 wrote to memory of 2888 1312 {CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe 42 PID 2896 wrote to memory of 2916 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 44 PID 2896 wrote to memory of 2916 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 44 PID 2896 wrote to memory of 2916 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 44 PID 2896 wrote to memory of 2916 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 44 PID 2896 wrote to memory of 2360 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 45 PID 2896 wrote to memory of 2360 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 45 PID 2896 wrote to memory of 2360 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 45 PID 2896 wrote to memory of 2360 2896 {4102076C-B806-4207-A519-405DC51E0166}.exe 45 PID 2916 wrote to memory of 824 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 46 PID 2916 wrote to memory of 824 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 46 PID 2916 wrote to memory of 824 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 46 PID 2916 wrote to memory of 824 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 46 PID 2916 wrote to memory of 2136 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 47 PID 2916 wrote to memory of 2136 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 47 PID 2916 wrote to memory of 2136 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 47 PID 2916 wrote to memory of 2136 2916 {5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exeC:\Windows\{8B13AB6C-05EF-49b0-99B6-DDBBD2D07DC6}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\{ECFB1810-F974-4084-814D-CCB85AF64D9A}.exeC:\Windows\{ECFB1810-F974-4084-814D-CCB85AF64D9A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\{299B38B6-9B6C-49be-90B6-01C59B1989E8}.exeC:\Windows\{299B38B6-9B6C-49be-90B6-01C59B1989E8}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\{F877F513-4616-495c-A8A7-D92D752DE49E}.exeC:\Windows\{F877F513-4616-495c-A8A7-D92D752DE49E}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exeC:\Windows\{CC15CE35-1B8D-4054-BF29-34CB6EAB2D0E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\{4102076C-B806-4207-A519-405DC51E0166}.exeC:\Windows\{4102076C-B806-4207-A519-405DC51E0166}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exeC:\Windows\{5BAFAC22-F8C4-4aaf-82D0-6A36FA020C96}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exeC:\Windows\{3FCC52A5-B8FB-409b-8966-4132E07C1B6D}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Windows\{4F575AD1-6F1E-4ab4-9022-562392E8C241}.exeC:\Windows\{4F575AD1-6F1E-4ab4-9022-562392E8C241}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\{9070ABE8-9006-4842-B992-DFDC258276A6}.exeC:\Windows\{9070ABE8-9006-4842-B992-DFDC258276A6}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exeC:\Windows\{B9CA2B7D-CC6F-40f9-8411-9ACA924BA006}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9070A~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4F575~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3FCC5~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5BAFA~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41020~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CC15C~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F877F~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{299B3~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECFB1~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B13A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD561a8235228d6d02167cbb115a95be8be
SHA1ac580ac58ada8196e488795c1568321afddfdac6
SHA256c9ad43cc181c6db5496776191468ed846fc7038f49af241a92156e42a13d0d4a
SHA51248b810120b8d2778a56334a49b62d1114c9f1ecb5b383b0090fa637263e423d61c343fb8e3487fa5655d4c2e410e3abfa3122c854b9e5547aea9aa6a31843dda
-
Filesize
372KB
MD504b356bebe7f3cb3624cc4fa8d28ec12
SHA140034101f9003845af29db97a81eb31f6f10340c
SHA256ee807ac7233ba94c4d7381aeae76db8435f91b50259e75170f569e574ad60e94
SHA512fc6e75f47396ecd81cb71f57c71d5814760f5d02a36b0c46714cfcc3855b8999e283b7c7ab71a2984e13d9503ccdc8599f9fbfab7a5b78551b6e5b09e5f7b939
-
Filesize
372KB
MD5dc1d3bb3d63b5444ebd3292564c94d29
SHA1972a55a8266aaf62f759455bf281445a437f2cfa
SHA2568d5ee5a35ce3b155ddb60b5b03168ab1fed43e77bc3990ae9db7a7055628f677
SHA51207119f105cf353bd80d6c32a9849b5d096a8755ed518fe7ec3dadbbc4da5883bbf14d66a47ad25e24ef342f51d1af01a23f86ac21e4b203f25eaba8130616ead
-
Filesize
372KB
MD57da230c22bb3a60efda5128c5b620b7c
SHA1f90883f816248fced14bc35a84ef5c0fbd4b3316
SHA256dc0fb5cce53cd759da64a8282b9790a0d12623f3973d1eda632321931806707e
SHA512527d707c5f2e63c1e10ca3964de9966750a8add9995dc10fa1586040b60b04b00b542250365c1fa26b0c1c1567ee158f59c87ee3b004a2cd244af07458f7d632
-
Filesize
372KB
MD56f4807680f5d5ad5c951c4d45c7bfd2a
SHA1b2b0d16ead5eb80858c5fb79d245cba76278f4b4
SHA256a093769f2c0e45d659d071067e9bc958e6ed94ec7c955b6dc540bc9e3de9e33a
SHA5126b34c334eb0c71d10dab2c88e8b3a341015e047559c9a6f7d77199e7f66ceb1d3cb489125a5e9e6da61aeec62fea8825bb640b76d0438c12404b3a3bdad7589d
-
Filesize
372KB
MD5436dd29b696ed9419a506d995b14d289
SHA1169e2f47b1e93d7d7aed9ac072d48b13949ade53
SHA256719deeacf88ca35a08e47b6862f862c97806f3f159370c30f9c451f947fdc6e4
SHA512e6b090a4834306df7d2b4363c2528fc91d29a91a7ff80ba70375cbe76c805d232605202753e4736265f082940114d6fd477bc7cf09aa3df50a4a65bb4c0e730f
-
Filesize
372KB
MD5ae8c74858e845c15346ce3549c250a8e
SHA12aba10744c2c968b7f7507dc003e563fa9dab6b1
SHA256767b606270516eabb44ef181182c17d4f64cbf49b00bc5acc143fcc5531330e9
SHA512b73d5cd3d1c66bb23cfe4a3c903024487ebe06c466978893bb1f54d6cf75d5db9f5d5dee8ac2b9efe9e066ed0cc109c8f75c5849bdcfce68fc634d4daccb78bc
-
Filesize
372KB
MD54bc86cdc57158913fc9b7e1d581f6f7b
SHA163f3a4d1e65292466f79d22bc47c9f9825f44d09
SHA25698458af9a31de35f0fad7abd642a44072a93fd5128357a11f5518a94d5470d1b
SHA5121df55cea854400cd3bfda0d330d4b1d68240b98e13c5baa8a4327463eed954f660851591f35d842aa7072a3675a4be4cb851af0f2ebb7bf7990e5b0ade834193
-
Filesize
372KB
MD5cf0e05b9b0e2ac58237d85b64b2ce1e2
SHA15e3adc88c46078cd2fee96a6a642fbc6d9b1f9d9
SHA2569f6771869289a037c660ea4ddef467b3daea547c75203a64d294d577b5bd5f32
SHA512be68d54045848b6f028de1a40ac7a2829dfb8b591b6ea8e6c641a24d563c0226b0ad4e77bf54e090699265fa097438d732e4f4d4425dfd7ae213d28b559afcd5
-
Filesize
372KB
MD5b7552cc86ca12b150e6c0d65ec0fdf5c
SHA16b8ca7002fb140df90ca0604e2cc2168fff8e55f
SHA256e262144ee5923f1e4c5954f679977e038f7667866d3810cb729a186cbab4f64f
SHA512db59533676d981de341ff45fc51514ed4ad6e896cd2b52e06530d7baf02f253baeed137344f7710ef6284e769e495b6ce962f812fdaf39822f6f3a2b7442e8de
-
Filesize
372KB
MD5b0e1433188a2b946020fe64f64b20407
SHA1a48379c862afa2cca689260b4c4131cfc3944f5c
SHA2566b83bec9f74d3fbf219a83375cbeaf8e794a1ce45d365d6df0108b6832fcf66b
SHA5126e62168791fdb8521d0b43535bb57958743caf55acfaf697a99e23d15152fcb946452ea84d2eef4d3805fcb9f9ae6ccbcc001bd921a59f0c870100436adbf8a6