Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe
-
Size
372KB
-
MD5
ad96f850339386bceb93b2f2d744a9c9
-
SHA1
42ba679a7ef9b200e97042036d2d35243c44a3c2
-
SHA256
8a19c5d2550e57284eea3e573df7248b3ec8c13da96d1d60176fff1ccdf2e00d
-
SHA512
69f973d30cd4d70521980dc89abd16ed3422b190e6b0e1144759b16b97450bb744cfe0dca82690a0b7067c8e36758033b24880c520e12fef2b00a536ae9ff848
-
SSDEEP
3072:CEGh0oxlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGnlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A4E7188-F929-4f80-B485-50ED9A1F75BA}\stubpath = "C:\\Windows\\{1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exe" {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4317E04-2D1D-4678-8326-838661B15B83} {1410C0B7-8671-410e-A13A-1E058BD65876}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4317E04-2D1D-4678-8326-838661B15B83}\stubpath = "C:\\Windows\\{B4317E04-2D1D-4678-8326-838661B15B83}.exe" {1410C0B7-8671-410e-A13A-1E058BD65876}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE4FD2F8-4065-49de-9975-0740F4E09D69} {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE4FD2F8-4065-49de-9975-0740F4E09D69}\stubpath = "C:\\Windows\\{AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe" {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C457E67E-7583-4fc1-9775-9636B1B8B085} {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C457E67E-7583-4fc1-9775-9636B1B8B085}\stubpath = "C:\\Windows\\{C457E67E-7583-4fc1-9775-9636B1B8B085}.exe" {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3} 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1410C0B7-8671-410e-A13A-1E058BD65876}\stubpath = "C:\\Windows\\{1410C0B7-8671-410e-A13A-1E058BD65876}.exe" {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C} {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652} {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A4E7188-F929-4f80-B485-50ED9A1F75BA} {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}\stubpath = "C:\\Windows\\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe" 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{68D1F9D6-619A-460b-AB94-0B38C9904F58} {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{68D1F9D6-619A-460b-AB94-0B38C9904F58}\stubpath = "C:\\Windows\\{68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe" {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F86D9F02-8F41-47ce-833A-D3510F1EE256}\stubpath = "C:\\Windows\\{F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe" {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872} {B4317E04-2D1D-4678-8326-838661B15B83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652}\stubpath = "C:\\Windows\\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe" {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F86D9F02-8F41-47ce-833A-D3510F1EE256} {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1410C0B7-8671-410e-A13A-1E058BD65876} {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}\stubpath = "C:\\Windows\\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe" {B4317E04-2D1D-4678-8326-838661B15B83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93F88875-515E-4b92-9CD0-A53CFA22730A} {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{93F88875-515E-4b92-9CD0-A53CFA22730A}\stubpath = "C:\\Windows\\{93F88875-515E-4b92-9CD0-A53CFA22730A}.exe" {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}\stubpath = "C:\\Windows\\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe" {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe -
Executes dropped EXE 12 IoCs
pid Process 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe 4372 {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe 4876 {1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe File created C:\Windows\{B4317E04-2D1D-4678-8326-838661B15B83}.exe {1410C0B7-8671-410e-A13A-1E058BD65876}.exe File created C:\Windows\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe File created C:\Windows\{AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe File created C:\Windows\{C457E67E-7583-4fc1-9775-9636B1B8B085}.exe {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe File created C:\Windows\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe File created C:\Windows\{1410C0B7-8671-410e-A13A-1E058BD65876}.exe {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe File created C:\Windows\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe {B4317E04-2D1D-4678-8326-838661B15B83}.exe File created C:\Windows\{93F88875-515E-4b92-9CD0-A53CFA22730A}.exe {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe File created C:\Windows\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe File created C:\Windows\{1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exe {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe File created C:\Windows\{F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1410C0B7-8671-410e-A13A-1E058BD65876}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B4317E04-2D1D-4678-8326-838661B15B83}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe Token: SeIncBasePriorityPrivilege 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe Token: SeIncBasePriorityPrivilege 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe Token: SeIncBasePriorityPrivilege 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe Token: SeIncBasePriorityPrivilege 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe Token: SeIncBasePriorityPrivilege 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe Token: SeIncBasePriorityPrivilege 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe Token: SeIncBasePriorityPrivilege 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe Token: SeIncBasePriorityPrivilege 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe Token: SeIncBasePriorityPrivilege 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe Token: SeIncBasePriorityPrivilege 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe Token: SeIncBasePriorityPrivilege 4372 {C457E67E-7583-4fc1-9775-9636B1B8B085}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4560 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 88 PID 1524 wrote to memory of 4560 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 88 PID 1524 wrote to memory of 4560 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 88 PID 1524 wrote to memory of 2340 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 89 PID 1524 wrote to memory of 2340 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 89 PID 1524 wrote to memory of 2340 1524 2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe 89 PID 4560 wrote to memory of 2644 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 91 PID 4560 wrote to memory of 2644 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 91 PID 4560 wrote to memory of 2644 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 91 PID 4560 wrote to memory of 4800 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 92 PID 4560 wrote to memory of 4800 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 92 PID 4560 wrote to memory of 4800 4560 {36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe 92 PID 2644 wrote to memory of 4312 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 95 PID 2644 wrote to memory of 4312 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 95 PID 2644 wrote to memory of 4312 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 95 PID 2644 wrote to memory of 2356 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 96 PID 2644 wrote to memory of 2356 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 96 PID 2644 wrote to memory of 2356 2644 {68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe 96 PID 4312 wrote to memory of 3584 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 97 PID 4312 wrote to memory of 3584 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 97 PID 4312 wrote to memory of 3584 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 97 PID 4312 wrote to memory of 4956 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 98 PID 4312 wrote to memory of 4956 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 98 PID 4312 wrote to memory of 4956 4312 {F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe 98 PID 3584 wrote to memory of 2560 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 99 PID 3584 wrote to memory of 2560 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 99 PID 3584 wrote to memory of 2560 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 99 PID 3584 wrote to memory of 2632 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 100 PID 3584 wrote to memory of 2632 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 100 PID 3584 wrote to memory of 2632 3584 {1410C0B7-8671-410e-A13A-1E058BD65876}.exe 100 PID 2560 wrote to memory of 1624 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 101 PID 2560 wrote to memory of 1624 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 101 PID 2560 wrote to memory of 1624 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 101 PID 2560 wrote to memory of 4400 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 102 PID 2560 wrote to memory of 4400 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 102 PID 2560 wrote to memory of 4400 2560 {B4317E04-2D1D-4678-8326-838661B15B83}.exe 102 PID 1624 wrote to memory of 1788 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 103 PID 1624 wrote to memory of 1788 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 103 PID 1624 wrote to memory of 1788 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 103 PID 1624 wrote to memory of 4512 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 104 PID 1624 wrote to memory of 4512 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 104 PID 1624 wrote to memory of 4512 1624 {CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe 104 PID 1788 wrote to memory of 2100 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 105 PID 1788 wrote to memory of 2100 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 105 PID 1788 wrote to memory of 2100 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 105 PID 1788 wrote to memory of 3820 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 106 PID 1788 wrote to memory of 3820 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 106 PID 1788 wrote to memory of 3820 1788 {93F88875-515E-4b92-9CD0-A53CFA22730A}.exe 106 PID 2100 wrote to memory of 3004 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 107 PID 2100 wrote to memory of 3004 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 107 PID 2100 wrote to memory of 3004 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 107 PID 2100 wrote to memory of 4844 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 108 PID 2100 wrote to memory of 4844 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 108 PID 2100 wrote to memory of 4844 2100 {00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe 108 PID 3004 wrote to memory of 452 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 109 PID 3004 wrote to memory of 452 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 109 PID 3004 wrote to memory of 452 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 109 PID 3004 wrote to memory of 2076 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 110 PID 3004 wrote to memory of 2076 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 110 PID 3004 wrote to memory of 2076 3004 {032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe 110 PID 452 wrote to memory of 4372 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe 111 PID 452 wrote to memory of 4372 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe 111 PID 452 wrote to memory of 4372 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe 111 PID 452 wrote to memory of 4540 452 {AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-04_ad96f850339386bceb93b2f2d744a9c9_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exeC:\Windows\{36EB4A9F-A1A7-43ad-A851-3078C4EE68B3}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\{68D1F9D6-619A-460b-AB94-0B38C9904F58}.exeC:\Windows\{68D1F9D6-619A-460b-AB94-0B38C9904F58}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{F86D9F02-8F41-47ce-833A-D3510F1EE256}.exeC:\Windows\{F86D9F02-8F41-47ce-833A-D3510F1EE256}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\{1410C0B7-8671-410e-A13A-1E058BD65876}.exeC:\Windows\{1410C0B7-8671-410e-A13A-1E058BD65876}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\{B4317E04-2D1D-4678-8326-838661B15B83}.exeC:\Windows\{B4317E04-2D1D-4678-8326-838661B15B83}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exeC:\Windows\{CDFF85C6-0EB7-4840-A9D2-77F70FC4B872}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\{93F88875-515E-4b92-9CD0-A53CFA22730A}.exeC:\Windows\{93F88875-515E-4b92-9CD0-A53CFA22730A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exeC:\Windows\{00AFD5A8-2998-44d5-BD90-B875C2B1AF6C}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exeC:\Windows\{032DDA6C-028A-4ef6-957C-7CBEA9C6C652}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\{AE4FD2F8-4065-49de-9975-0740F4E09D69}.exeC:\Windows\{AE4FD2F8-4065-49de-9975-0740F4E09D69}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\{C457E67E-7583-4fc1-9775-9636B1B8B085}.exeC:\Windows\{C457E67E-7583-4fc1-9775-9636B1B8B085}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\{1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exeC:\Windows\{1A4E7188-F929-4f80-B485-50ED9A1F75BA}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C457E~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE4FD~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{032DD~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{00AFD~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93F88~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CDFF8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B4317~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1410C~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F86D9~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{68D1F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{36EB4~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD56220c5288142a399b8f43885ce902648
SHA12c42e19df74c4348994ae17791476572017420fc
SHA2569d0cec9652e596319af32e42caa2a879844a95f7efeeec0e28274f4580e535db
SHA51203370f2adba1f22159e378dee8c4f6ae342b3ce540f2e15196599e069c07667562ae7e70ea40a279e5184abb2ea49696b60cc7dbfe5efe6665bd173c70ff7249
-
Filesize
372KB
MD5abd9fb0ff68e8318db20cde80ef70a20
SHA13f8e314b0b80f4df5bb11f0ee7ec66671dbe962b
SHA256b8e79e0a892e95d0180e4883491d0e7a700af80d8c51ec758a57898d8d6d7163
SHA512de023b5175f563cc02c15b34deed653e6b5d58c61e1ee01140520a114dd2c9b81c7ecb2171502a3cf88ccec2c1edca2e8181e6d2a7c9d91bdd9ee22b820bbf65
-
Filesize
372KB
MD5bfa4f69fa561bee17d81b5f2622c8a03
SHA138aef8497d0381faf4207a78854ed2025d2b72e9
SHA256ec02dfbc782097a5a81db0e447a0a123ed67aaa769cc144237dc895c84e06eae
SHA5124ebe176d8b2826aeab3bf9d7c714ef8af3c55048f7970ea2fcf99f67f564b7d8aaf563b7af1ad3fdbab0ea6a7d141f97bce0f0ec5a1bbd8caa093bf14b15c5f3
-
Filesize
372KB
MD5a9728d478fa5c62e2a4ca5803fcfb49d
SHA19a3e59670cec5b2559c3d146ab0c1b156a5d052e
SHA25650b7c380f9f50fb5a0f33d36253db3fe44566539efac3a759452b5bdaac56961
SHA5126e7e27aae73d73620a9e0b02a0c9d3649e682a06decac1fbf3dffe3d7c301f066801821725964bb093dd28619a57d38cff7b9e7db1290d182c52e4cc098e04e0
-
Filesize
372KB
MD553cc5f422d1e881dba0dedd11819a0c6
SHA1f141d8c9c70d735fbc49b16324252122e5c1c1ab
SHA2568312857ce0c051ed85eb7bd03e9623fe631b315f65a0c33dbf79f3d0aa9760c8
SHA51249ba235321f1eb57241eeb222add6a1529043b47cefd8171d5d6229d4f55014ccfc34e0e9fb09cec98d9ea6b36255d9f330318bade6567d0adc5d0591f74fb70
-
Filesize
372KB
MD54bf472b0c0291f802583970efcd08506
SHA1b61813e3ec5cc4e9540b4849544f337318a6a56e
SHA256d5196d887e3113d3ec8a20fa36ed51131d24ea059597546d74c6fbb06d39488c
SHA512b83854d1f839977731af8fdb0de3d30580ccd98b35c36a7aa33c81028aee0c938d5e336ca6b8200b166447437a2c4e8727adce58722eded75f559d7138b7a929
-
Filesize
372KB
MD5103a0a90ac5a0383afa67cee35aadb6c
SHA1439c8671cef865a9a2f6eefe85607327c9ff00b2
SHA256bb363266fa39cab1ed40994e16f8f01914d8b41428fc36c1a4d59f6d82860bf6
SHA51202fef226b8d9175597a7387a802aae7d03df018e002bb056ae3446b4a7d8aa319d345be0d6942417329a6cf26156272aa0fd41346c5911f49c0293c139a41c6b
-
Filesize
372KB
MD5e62aa4567bc54d31149431fe2bb70ef8
SHA132c4b87bb853920b25c2a0c78ce877c327333029
SHA2563cb87c5b4c8b00cffff50234af009101fb546fbc509d5c9c2c6594400106e8c5
SHA5125462e06e8c079cde07ec267a36ef3ef8de72166f1ecd21ea4a4e22362497427983d49aacb77a0d79ba24a412d1eab785549691bbd8b69079d104410442fe7022
-
Filesize
372KB
MD532ac0f7487b1ec4b129fdf0f2fd13bd2
SHA19026e7dc61ba2ef4f787b50a72cb19e2cfcb564e
SHA256117cc98bc3adcc0e792e237e5950d200de9be9403377e643929da86f4103e122
SHA512302ad5d27d001b65953a17b7caf18c6e33a5c5a295799eb1993da6b477f2ed98cef27f28805a87c01e4017fc572468d22553b0af243dade3d40b02b2115d6420
-
Filesize
372KB
MD5d93a9b31abe0bbcf8f28a7bbc13fad4c
SHA1a5eb757aa4ce6289299212074c9436f4d70264de
SHA2564cde117adbecfaff5d8f6a3ce53341ca772eeec0b6f5f0e884917323350d2b79
SHA5120b6b10ff2a1727c5a32cc567b304f388fc530556cd462be5636875132b206cc34e5c7545a525dd13c543d1bf5ae6dc029d5f711327f30d28ffb3fc89cb10e80a
-
Filesize
372KB
MD5c99af893365c7cbc18ea5d9f72530656
SHA1f69bc8508559ce84ef06a8224287e954eae32267
SHA2562658e38322ab08d2ee9022777a306de6b92e4ca6c49ac6619a099144aed20ab7
SHA5125438b341d82c14813970f1b63317fbb1633651183af4906f5308b9d5a745a10d5b0ec668682f141e8c0fe68d783d92de30c33848fc6ef982d1b95a1af1097dff
-
Filesize
372KB
MD5490bd501b9faf112b22a321c954f87ee
SHA110fa208b998b12f4bbb31189e44b26d360bc8b86
SHA256c704c9427335e84e185e0ac02356ec799d21007fe26a999e1af7a2bc756d3cbc
SHA512ed99302354d6dc33c42eac639c1153a9af48376a1c9c890f02de3053338709a1d4ccaa8ab4461cfd1bda0b6516f31c20c3ffbf816663fa5daf4e1398bda6e857