Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe
-
Size
216KB
-
MD5
27326c2b7a744505f6a807c371d9debd
-
SHA1
b067a62f3193e3a08de36cd3f8149a4f748ced3c
-
SHA256
975f89f201ac9238e25f04d75c1a0de5d1d301eb02f6bc3cf06e23e67bacf61e
-
SHA512
2958fd3c47946f549dd22c61d15d49702ad55ec6a8fbbc08b2422d96a9e9c5e5fcb352dcfcf7dbb21c6b93d9cab7649d556ace7441da099df8cd5a401cef7d5c
-
SSDEEP
3072:jEGh0okl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGmlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}\stubpath = "C:\\Windows\\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe" {60791A39-E572-4f57-B9FE-974EE470644E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}\stubpath = "C:\\Windows\\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe" {32D14430-98C0-4627-AA0A-93590ABE1489}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33F77DD5-935B-4e82-8606-8FAECA426B7D} {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA4521D4-82D7-49fe-99FE-5307EC30F584} {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA4521D4-82D7-49fe-99FE-5307EC30F584}\stubpath = "C:\\Windows\\{DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe" {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0F03666-ED7D-4030-A91D-F77D2D26336C}\stubpath = "C:\\Windows\\{C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe" {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E37669E-E983-4591-96B1-E8613E9B7FA0} {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E37669E-E983-4591-96B1-E8613E9B7FA0}\stubpath = "C:\\Windows\\{7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe" {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32D14430-98C0-4627-AA0A-93590ABE1489} {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63581107-DA6D-4065-838C-5E5B20F6ED75}\stubpath = "C:\\Windows\\{63581107-DA6D-4065-838C-5E5B20F6ED75}.exe" {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{33F77DD5-935B-4e82-8606-8FAECA426B7D}\stubpath = "C:\\Windows\\{33F77DD5-935B-4e82-8606-8FAECA426B7D}.exe" {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{541DE94A-B215-4c39-9171-BA0EA09111B4}\stubpath = "C:\\Windows\\{541DE94A-B215-4c39-9171-BA0EA09111B4}.exe" 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60791A39-E572-4f57-B9FE-974EE470644E}\stubpath = "C:\\Windows\\{60791A39-E572-4f57-B9FE-974EE470644E}.exe" {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0F03666-ED7D-4030-A91D-F77D2D26336C} {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{32D14430-98C0-4627-AA0A-93590ABE1489}\stubpath = "C:\\Windows\\{32D14430-98C0-4627-AA0A-93590ABE1489}.exe" {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E} {32D14430-98C0-4627-AA0A-93590ABE1489}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60791A39-E572-4f57-B9FE-974EE470644E} {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2F2988B-27BA-4cf9-B811-0D2AA004462E}\stubpath = "C:\\Windows\\{D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe" {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D2F2988B-27BA-4cf9-B811-0D2AA004462E} {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{63581107-DA6D-4065-838C-5E5B20F6ED75} {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{541DE94A-B215-4c39-9171-BA0EA09111B4} 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42} {60791A39-E572-4f57-B9FE-974EE470644E}.exe -
Deletes itself 1 IoCs
pid Process 1920 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 536 {32D14430-98C0-4627-AA0A-93590ABE1489}.exe 2540 {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe 2532 {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe 408 {33F77DD5-935B-4e82-8606-8FAECA426B7D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe File created C:\Windows\{63581107-DA6D-4065-838C-5E5B20F6ED75}.exe {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe File created C:\Windows\{541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe File created C:\Windows\{DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe File created C:\Windows\{60791A39-E572-4f57-B9FE-974EE470644E}.exe {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe File created C:\Windows\{D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe File created C:\Windows\{33F77DD5-935B-4e82-8606-8FAECA426B7D}.exe {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe File created C:\Windows\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe {60791A39-E572-4f57-B9FE-974EE470644E}.exe File created C:\Windows\{C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe File created C:\Windows\{32D14430-98C0-4627-AA0A-93590ABE1489}.exe {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe File created C:\Windows\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe {32D14430-98C0-4627-AA0A-93590ABE1489}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {60791A39-E572-4f57-B9FE-974EE470644E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32D14430-98C0-4627-AA0A-93590ABE1489}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33F77DD5-935B-4e82-8606-8FAECA426B7D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe Token: SeIncBasePriorityPrivilege 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe Token: SeIncBasePriorityPrivilege 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe Token: SeIncBasePriorityPrivilege 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe Token: SeIncBasePriorityPrivilege 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe Token: SeIncBasePriorityPrivilege 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe Token: SeIncBasePriorityPrivilege 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe Token: SeIncBasePriorityPrivilege 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe Token: SeIncBasePriorityPrivilege 536 {32D14430-98C0-4627-AA0A-93590ABE1489}.exe Token: SeIncBasePriorityPrivilege 2540 {0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe Token: SeIncBasePriorityPrivilege 2532 {63581107-DA6D-4065-838C-5E5B20F6ED75}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3024 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 31 PID 2460 wrote to memory of 3024 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 31 PID 2460 wrote to memory of 3024 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 31 PID 2460 wrote to memory of 3024 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 31 PID 2460 wrote to memory of 1920 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 32 PID 2460 wrote to memory of 1920 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 32 PID 2460 wrote to memory of 1920 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 32 PID 2460 wrote to memory of 1920 2460 2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe 32 PID 3024 wrote to memory of 2740 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 33 PID 3024 wrote to memory of 2740 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 33 PID 3024 wrote to memory of 2740 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 33 PID 3024 wrote to memory of 2740 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 33 PID 3024 wrote to memory of 2716 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 34 PID 3024 wrote to memory of 2716 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 34 PID 3024 wrote to memory of 2716 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 34 PID 3024 wrote to memory of 2716 3024 {541DE94A-B215-4c39-9171-BA0EA09111B4}.exe 34 PID 2740 wrote to memory of 2252 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 35 PID 2740 wrote to memory of 2252 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 35 PID 2740 wrote to memory of 2252 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 35 PID 2740 wrote to memory of 2252 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 35 PID 2740 wrote to memory of 2924 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 36 PID 2740 wrote to memory of 2924 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 36 PID 2740 wrote to memory of 2924 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 36 PID 2740 wrote to memory of 2924 2740 {DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe 36 PID 2252 wrote to memory of 2892 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 37 PID 2252 wrote to memory of 2892 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 37 PID 2252 wrote to memory of 2892 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 37 PID 2252 wrote to memory of 2892 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 37 PID 2252 wrote to memory of 2980 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 38 PID 2252 wrote to memory of 2980 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 38 PID 2252 wrote to memory of 2980 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 38 PID 2252 wrote to memory of 2980 2252 {60791A39-E572-4f57-B9FE-974EE470644E}.exe 38 PID 2892 wrote to memory of 2848 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 39 PID 2892 wrote to memory of 2848 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 39 PID 2892 wrote to memory of 2848 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 39 PID 2892 wrote to memory of 2848 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 39 PID 2892 wrote to memory of 2592 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 40 PID 2892 wrote to memory of 2592 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 40 PID 2892 wrote to memory of 2592 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 40 PID 2892 wrote to memory of 2592 2892 {B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe 40 PID 2848 wrote to memory of 1532 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 41 PID 2848 wrote to memory of 1532 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 41 PID 2848 wrote to memory of 1532 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 41 PID 2848 wrote to memory of 1532 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 41 PID 2848 wrote to memory of 1608 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 42 PID 2848 wrote to memory of 1608 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 42 PID 2848 wrote to memory of 1608 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 42 PID 2848 wrote to memory of 1608 2848 {D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe 42 PID 1532 wrote to memory of 1364 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 43 PID 1532 wrote to memory of 1364 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 43 PID 1532 wrote to memory of 1364 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 43 PID 1532 wrote to memory of 1364 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 43 PID 1532 wrote to memory of 2872 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 44 PID 1532 wrote to memory of 2872 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 44 PID 1532 wrote to memory of 2872 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 44 PID 1532 wrote to memory of 2872 1532 {C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe 44 PID 1364 wrote to memory of 536 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 45 PID 1364 wrote to memory of 536 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 45 PID 1364 wrote to memory of 536 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 45 PID 1364 wrote to memory of 536 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 45 PID 1364 wrote to memory of 788 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 46 PID 1364 wrote to memory of 788 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 46 PID 1364 wrote to memory of 788 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 46 PID 1364 wrote to memory of 788 1364 {7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_27326c2b7a744505f6a807c371d9debd_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\{541DE94A-B215-4c39-9171-BA0EA09111B4}.exeC:\Windows\{541DE94A-B215-4c39-9171-BA0EA09111B4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\{DA4521D4-82D7-49fe-99FE-5307EC30F584}.exeC:\Windows\{DA4521D4-82D7-49fe-99FE-5307EC30F584}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{60791A39-E572-4f57-B9FE-974EE470644E}.exeC:\Windows\{60791A39-E572-4f57-B9FE-974EE470644E}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exeC:\Windows\{B6FB2BEA-FA6B-4bff-8D9A-381A31B48E42}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exeC:\Windows\{D2F2988B-27BA-4cf9-B811-0D2AA004462E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\{C0F03666-ED7D-4030-A91D-F77D2D26336C}.exeC:\Windows\{C0F03666-ED7D-4030-A91D-F77D2D26336C}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\{7E37669E-E983-4591-96B1-E8613E9B7FA0}.exeC:\Windows\{7E37669E-E983-4591-96B1-E8613E9B7FA0}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\{32D14430-98C0-4627-AA0A-93590ABE1489}.exeC:\Windows\{32D14430-98C0-4627-AA0A-93590ABE1489}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exeC:\Windows\{0236E05F-B6A1-45e3-9FD3-FC1AB47A207E}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\{63581107-DA6D-4065-838C-5E5B20F6ED75}.exeC:\Windows\{63581107-DA6D-4065-838C-5E5B20F6ED75}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Windows\{33F77DD5-935B-4e82-8606-8FAECA426B7D}.exeC:\Windows\{33F77DD5-935B-4e82-8606-8FAECA426B7D}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63581~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0236E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32D14~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E376~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0F03~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2F29~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6FB2~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60791~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DA452~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{541DE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5cf9674fc7975933cc30ae1407878942b
SHA1ee3943d16a340cc180ccdea58291261a37100d48
SHA256487c669ce205f14d3de79fd703940ee21945106e327ecc2d9ab5749b0066dc5b
SHA512e7a0c6921aa91b8cd1f42a780717dbdf1ee6afd23e216f0d2770ccaa055b54400fb201e5656676cd1ee7cdf7d3a05fa3f58b1f96bceb4856a8f7bcfe8ab25050
-
Filesize
216KB
MD51d7417211665ac2eef62cebee6c3ceac
SHA1a99b6223b760d5b9444c0d907cff3297c1a54136
SHA256863fa5c62cb01ce08d4dc0615601990de76bfd5006bc0c7dbfe967866eb41ded
SHA512329c5ede935a9599a468b04b5a8db24a2285663bc9959fcf99f91516b813c391de95bc942d4700cd0eade9aebd04bb7be03d7ca52e8e3c937b1a0efd6965ffdc
-
Filesize
216KB
MD5f7eda0cc077b71f1b929ca6f5fda4100
SHA194142d65517c5ae5fe53a000ea84ff782685fc05
SHA256bf022c1120c158b7fc82cf7f9f6f82936672d666ef2e9d84270fc5cc49d61257
SHA512d2b036d399aed28fdee4af662f408be0f766a77d57d43fa825ed4f213330ca14f893d0a6c8497834a49109ebfaf438d7e5043e1200ff6ca2c81eb0205b89f6ed
-
Filesize
216KB
MD5fc502bcbb10bda94a87486c08f4ff0a0
SHA14592099a6251d894f89b27733e20eb0e5ad24759
SHA25607a0c8b13fd5ebd2bd6bf1758c4179db07e661c743a5f258635505e2efdce13e
SHA512664109b95c0333537ef056c87bbc571d78d820b41907f0c5c61323be19a9712ffc239d44b75d66dccc7b4d9af6c61b4a8b932eb3e8a9ea7fbd549b29ba479b92
-
Filesize
216KB
MD55e8448a72b5db4dc22c4c58eaf5fcbfa
SHA114a6ac24d4722470943f7bda0c351c3c4821658b
SHA25678605fe13b52e75dca558c7cb6c14515fd39a28ea9e2922b70c3369fa254cf04
SHA512e6d81d378641ae64b0a204af512e7f6cc0fc5ad20f8db661c29e46f6c0711776ed9c6345e7aa904c4e08de26e14143535b18f0f182eadfc90bb969cb3daf141d
-
Filesize
216KB
MD5a11ed8bf9a93fe111ba5935515135e0f
SHA1bc8471f7cb5e63d04f98e2b08aae02dacfe75a6c
SHA2560ac5de1ae420b8808213d7156bfdc047f9159ffb199dc4b2655782ad7a1d0627
SHA512c587ccf2a15da546caeb4e0a5bfc14b1e499a52721fa19e20f2ecc651e6279f522a0cb9c01b5a1731597cdfbd9b4ad8975192818e8199e8872b78b92cf26e1b9
-
Filesize
216KB
MD5c2851a78b53e3301dcfeff205771dea6
SHA1d51cbeed2c5a7bd2ff0f66dfe5061107cc40a33e
SHA256f2c9a8af459288f7025c9f18da7acf9201dbba7940b47d745f37936d5420aa2f
SHA51233456064951fab2b83148fa4eb3d5cec41fb8d28be9f9b6e03813f6444a89d7b787fb9a0df1379517a98c50ebcc662b8c868ac31f84b2184cc47160f6b1bc75f
-
Filesize
216KB
MD59ece438fa8435092d4ed3fb76f4a2309
SHA1a3bfb0873da1875f671a5c7b5f8c3528309de7a9
SHA256b93ff83e3342b05c723e8c6da5b9abf6a3b0c2751ada840f185a91217d5489ab
SHA5129f53ff2cc161625f07efcbee8d0d7ae1d8f5f86568a001c40925176268915cab9c7be598aa5f93c6f6704f05231df5c66c0f9a0127a2bbf5a3f076f7455cd28b
-
Filesize
216KB
MD5ac1b295a67b84b497a2730b145d8d569
SHA1609ee8b73d8c91d0c2aef54dcb312a98b7f11955
SHA256d5ccb5a7c71c41d65c9e0ae275771f066a5c47419dfa26559c0d339efcacbe74
SHA5123944c85d366e01bb644734cf42678e71fdf820ad01e9283967bb278323858b28c39e782eabb6f10138b3f7ae6008ffa1e2229940c7f83b1cf9fe854fd4b08c0f
-
Filesize
216KB
MD591da7aefd23033b33eef0e5213147de9
SHA1291a23e1618f1046b38522fee6f5ab62573c6223
SHA256676401bf6505c038a3a0dde054a47893f94b983cf4c71f51f0fd9955d1cbae41
SHA5126e4ba74911d3953c39472b1475113af444f21a4e85428f9fff9f04308b50d0f6b926eb0b2b6383865c3335aba5cd4a9a46de8fbaed12bc743d7d7a97419c4ad6
-
Filesize
216KB
MD547fd1a4d2b15ee687f7a10121b5dfaf3
SHA14d5de4a23a1507e54f910c8d1d50a994d4a9d25c
SHA25673342deb9092dc0361e96f3f160b012ea2c512f58724b3ba81c12a8b2a5cf932
SHA512908c682064847dfc111cdb8d10d6bb5abf9274d4e52e7c652f212f5b96759ad356b0140c6b99e8472f1c73f0d37764911e5bcac09129d791f6a330a16d4dad64