Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe
-
Size
168KB
-
MD5
dab6d8f1ef18fbf3b0e954085c0c51da
-
SHA1
53821e3046a8d61dfd565949a18b1cf93f91c3b9
-
SHA256
0fb6d5d629bc87c4f0e67626a71eddce44508909b4fa8c32c84df39d7627dfef
-
SHA512
b0a6acac2863b1bda9808959bf2429a84c1a19fef26839e8afbdaad15e474871dd9496bfd8dedd3c21441b028a1f07b2e376ceac760c1563034c8f70a95762c8
-
SSDEEP
1536:1EGh0osqlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0osqlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33B78FBC-C9B1-47c3-975D-475453D18EF7}\stubpath = "C:\\Windows\\{33B78FBC-C9B1-47c3-975D-475453D18EF7}.exe" {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C023463-2F10-4451-BDC4-39379290246A}\stubpath = "C:\\Windows\\{8C023463-2F10-4451-BDC4-39379290246A}.exe" {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3F71301-0351-4792-9980-943611A7DE0A} {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}\stubpath = "C:\\Windows\\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe" {16900415-F015-4455-9C34-5D0475251D14}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}\stubpath = "C:\\Windows\\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe" {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513} {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513}\stubpath = "C:\\Windows\\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe" {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16900415-F015-4455-9C34-5D0475251D14} {A3F71301-0351-4792-9980-943611A7DE0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7} {16900415-F015-4455-9C34-5D0475251D14}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EEC3C6C3-4542-406b-BD1E-960033DCC973} 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD85697D-E012-46ec-8223-1E09A4B19B05} {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F} {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33B78FBC-C9B1-47c3-975D-475453D18EF7} {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C016E34E-9E0A-4844-9008-615F9BCF5072} {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66CE5EAB-4F95-47cc-9942-6E934769D968} {8C023463-2F10-4451-BDC4-39379290246A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{66CE5EAB-4F95-47cc-9942-6E934769D968}\stubpath = "C:\\Windows\\{66CE5EAB-4F95-47cc-9942-6E934769D968}.exe" {8C023463-2F10-4451-BDC4-39379290246A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C023463-2F10-4451-BDC4-39379290246A} {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A3F71301-0351-4792-9980-943611A7DE0A}\stubpath = "C:\\Windows\\{A3F71301-0351-4792-9980-943611A7DE0A}.exe" {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16900415-F015-4455-9C34-5D0475251D14}\stubpath = "C:\\Windows\\{16900415-F015-4455-9C34-5D0475251D14}.exe" {A3F71301-0351-4792-9980-943611A7DE0A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F} {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}\stubpath = "C:\\Windows\\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe" {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EEC3C6C3-4542-406b-BD1E-960033DCC973}\stubpath = "C:\\Windows\\{EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe" 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD85697D-E012-46ec-8223-1E09A4B19B05}\stubpath = "C:\\Windows\\{BD85697D-E012-46ec-8223-1E09A4B19B05}.exe" {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C016E34E-9E0A-4844-9008-615F9BCF5072}\stubpath = "C:\\Windows\\{C016E34E-9E0A-4844-9008-615F9BCF5072}.exe" {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe -
Executes dropped EXE 12 IoCs
pid Process 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe 4576 {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe 548 {33B78FBC-C9B1-47c3-975D-475453D18EF7}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{C016E34E-9E0A-4844-9008-615F9BCF5072}.exe {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe File created C:\Windows\{8C023463-2F10-4451-BDC4-39379290246A}.exe {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe File created C:\Windows\{A3F71301-0351-4792-9980-943611A7DE0A}.exe {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe File created C:\Windows\{16900415-F015-4455-9C34-5D0475251D14}.exe {A3F71301-0351-4792-9980-943611A7DE0A}.exe File created C:\Windows\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe File created C:\Windows\{EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe File created C:\Windows\{BD85697D-E012-46ec-8223-1E09A4B19B05}.exe {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe File created C:\Windows\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe File created C:\Windows\{33B78FBC-C9B1-47c3-975D-475453D18EF7}.exe {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe File created C:\Windows\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe File created C:\Windows\{66CE5EAB-4F95-47cc-9942-6E934769D968}.exe {8C023463-2F10-4451-BDC4-39379290246A}.exe File created C:\Windows\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe {16900415-F015-4455-9C34-5D0475251D14}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8C023463-2F10-4451-BDC4-39379290246A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A3F71301-0351-4792-9980-943611A7DE0A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16900415-F015-4455-9C34-5D0475251D14}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {33B78FBC-C9B1-47c3-975D-475453D18EF7}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe Token: SeIncBasePriorityPrivilege 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe Token: SeIncBasePriorityPrivilege 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe Token: SeIncBasePriorityPrivilege 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe Token: SeIncBasePriorityPrivilege 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe Token: SeIncBasePriorityPrivilege 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe Token: SeIncBasePriorityPrivilege 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe Token: SeIncBasePriorityPrivilege 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe Token: SeIncBasePriorityPrivilege 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe Token: SeIncBasePriorityPrivilege 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe Token: SeIncBasePriorityPrivilege 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe Token: SeIncBasePriorityPrivilege 4576 {3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 1936 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 82 PID 400 wrote to memory of 1936 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 82 PID 400 wrote to memory of 1936 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 82 PID 400 wrote to memory of 1632 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 83 PID 400 wrote to memory of 1632 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 83 PID 400 wrote to memory of 1632 400 2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe 83 PID 1936 wrote to memory of 1556 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 89 PID 1936 wrote to memory of 1556 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 89 PID 1936 wrote to memory of 1556 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 89 PID 1936 wrote to memory of 548 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 90 PID 1936 wrote to memory of 548 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 90 PID 1936 wrote to memory of 548 1936 {EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe 90 PID 1556 wrote to memory of 3692 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 95 PID 1556 wrote to memory of 3692 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 95 PID 1556 wrote to memory of 3692 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 95 PID 1556 wrote to memory of 2060 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 96 PID 1556 wrote to memory of 2060 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 96 PID 1556 wrote to memory of 2060 1556 {BD85697D-E012-46ec-8223-1E09A4B19B05}.exe 96 PID 3692 wrote to memory of 2084 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 97 PID 3692 wrote to memory of 2084 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 97 PID 3692 wrote to memory of 2084 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 97 PID 3692 wrote to memory of 3188 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 98 PID 3692 wrote to memory of 3188 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 98 PID 3692 wrote to memory of 3188 3692 {1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe 98 PID 2084 wrote to memory of 1528 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 99 PID 2084 wrote to memory of 1528 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 99 PID 2084 wrote to memory of 1528 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 99 PID 2084 wrote to memory of 452 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 100 PID 2084 wrote to memory of 452 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 100 PID 2084 wrote to memory of 452 2084 {9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe 100 PID 1528 wrote to memory of 3660 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 101 PID 1528 wrote to memory of 3660 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 101 PID 1528 wrote to memory of 3660 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 101 PID 1528 wrote to memory of 5112 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 102 PID 1528 wrote to memory of 5112 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 102 PID 1528 wrote to memory of 5112 1528 {C016E34E-9E0A-4844-9008-615F9BCF5072}.exe 102 PID 3660 wrote to memory of 3020 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 103 PID 3660 wrote to memory of 3020 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 103 PID 3660 wrote to memory of 3020 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 103 PID 3660 wrote to memory of 2312 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 104 PID 3660 wrote to memory of 2312 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 104 PID 3660 wrote to memory of 2312 3660 {8C023463-2F10-4451-BDC4-39379290246A}.exe 104 PID 3020 wrote to memory of 3408 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 105 PID 3020 wrote to memory of 3408 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 105 PID 3020 wrote to memory of 3408 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 105 PID 3020 wrote to memory of 836 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 106 PID 3020 wrote to memory of 836 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 106 PID 3020 wrote to memory of 836 3020 {66CE5EAB-4F95-47cc-9942-6E934769D968}.exe 106 PID 3408 wrote to memory of 3016 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 107 PID 3408 wrote to memory of 3016 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 107 PID 3408 wrote to memory of 3016 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 107 PID 3408 wrote to memory of 2636 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 108 PID 3408 wrote to memory of 2636 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 108 PID 3408 wrote to memory of 2636 3408 {A3F71301-0351-4792-9980-943611A7DE0A}.exe 108 PID 3016 wrote to memory of 2644 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 109 PID 3016 wrote to memory of 2644 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 109 PID 3016 wrote to memory of 2644 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 109 PID 3016 wrote to memory of 724 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 110 PID 3016 wrote to memory of 724 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 110 PID 3016 wrote to memory of 724 3016 {16900415-F015-4455-9C34-5D0475251D14}.exe 110 PID 2644 wrote to memory of 4576 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe 111 PID 2644 wrote to memory of 4576 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe 111 PID 2644 wrote to memory of 4576 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe 111 PID 2644 wrote to memory of 2668 2644 {F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_dab6d8f1ef18fbf3b0e954085c0c51da_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\{EEC3C6C3-4542-406b-BD1E-960033DCC973}.exeC:\Windows\{EEC3C6C3-4542-406b-BD1E-960033DCC973}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\{BD85697D-E012-46ec-8223-1E09A4B19B05}.exeC:\Windows\{BD85697D-E012-46ec-8223-1E09A4B19B05}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exeC:\Windows\{1A475FC4-5F2F-44f8-BA73-064E5BCA5D9F}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exeC:\Windows\{9B57EF92-CF18-4b3e-A916-A7E8EDD96513}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\{C016E34E-9E0A-4844-9008-615F9BCF5072}.exeC:\Windows\{C016E34E-9E0A-4844-9008-615F9BCF5072}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\{8C023463-2F10-4451-BDC4-39379290246A}.exeC:\Windows\{8C023463-2F10-4451-BDC4-39379290246A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\{66CE5EAB-4F95-47cc-9942-6E934769D968}.exeC:\Windows\{66CE5EAB-4F95-47cc-9942-6E934769D968}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\{A3F71301-0351-4792-9980-943611A7DE0A}.exeC:\Windows\{A3F71301-0351-4792-9980-943611A7DE0A}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\{16900415-F015-4455-9C34-5D0475251D14}.exeC:\Windows\{16900415-F015-4455-9C34-5D0475251D14}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exeC:\Windows\{F96AAA69-66F4-4bf1-827A-D0311ECCA6C7}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exeC:\Windows\{3069B200-1B0B-4d5b-840A-5D94B3C7CF7F}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\{33B78FBC-C9B1-47c3-975D-475453D18EF7}.exeC:\Windows\{33B78FBC-C9B1-47c3-975D-475453D18EF7}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3069B~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F96AA~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16900~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A3F71~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{66CE5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C023~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C016E~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B57E~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A475~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD856~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EEC3C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5463b111acd4981b0cb989550eaac6786
SHA1c87228252d5e33226c61ff4ae91c7ffc483b95e9
SHA256fafb6f720d6a8bae17bc12688de54d2a57c5a891e45518fdb616a5b0c4501614
SHA512ee1d2266cedf4f4a1ae5ac9a320affa22e10086689ef9bea39a99158682a41144cd3b5bb423ca8aa30b34e6c2938c90839462b48745262bc62b2d53bddc92f65
-
Filesize
168KB
MD5623984033e0ce4ba637e22ee46d84748
SHA19854db484b5252001236fd2d57eee53703b27deb
SHA256dd8c0e5b0925c36c5daadd6b04defed02f0bbbb340d01724534aa1faaf49bf9a
SHA512c6503b5a2fc9c1f3ab6268fd6a2451c9fea474ea61b5d3fb38f791cec6817946d5ab67c1ff9c29448259463d96ee2433709b653f3b365c2116d697ff32f75cfb
-
Filesize
168KB
MD5d73785792776fe07bb7da1edf4abb08b
SHA1f7b2bb911d0023d7d6624d10d75be51a329e84f6
SHA2567b9f1902144cb18860951e4a277f180df616456b75b12191452180b2173be7f9
SHA5129bd2987309a9b67804acbc192655146b246368e1fd7a492b645c1347a6b35ae7d367f7ca14f9e5c558a2630df3322e8e3bd032642a017e24a35a0d8d5c410d8b
-
Filesize
168KB
MD5360e2d8d91c881791a98f246d6ee4332
SHA11e86df06ecbdcb41876c0e46c168bf7d009046b1
SHA256eb817af0d2b549a0e52aa92540dd5c08d57708091109bf893761aedeae5cd853
SHA512ae6862f0f2ee315cf9036d160cc208ee11ba3e9bb03357a5e97dd8f490daf8dc3135c73b5c5796771157ac76f1ae5ce3cbdc363385866ea6865ef008da59cab2
-
Filesize
168KB
MD5ea7cf2a1eb2988cfaa3a1037b32d3bae
SHA1c8186b59afd4aa3484104e44cd18926dc3bcd26d
SHA2561687d948dd791b1c66cd42dc54db4f481c215c1161309b4a18c11e56541f43ff
SHA5129f67be9e77667c49e89330c03568fced28e1f8a28f4e3570a52f64a3d28ea449366b24d3773d2a9f682c393949e02098a40678f0a3a9e20cbf5f471c9791f450
-
Filesize
168KB
MD5fa1f0972f41dbea2cca0526b40a5af1c
SHA150930728e0c9dcea7cc01d9d00cf72cabb3f94fe
SHA25685ba166c8f473a1288a052ed9d36a4485a81b0cb982329020d7ab00bafc9bc4d
SHA51295a2af6bac53038c95b1f216f173204eb526f9b0300fa0233e413c2564fd1de31d0cbc524628b090a6517b54a7f1138c5218b3ea6a1ec2cc74e9cb025b3ff768
-
Filesize
168KB
MD5ae21469a7ccbbd8efbc46e5d7f64d12a
SHA1e306ea3330d480b547b762cbb7a87a1c92b0cb1e
SHA2569afc1e14cc64e2a9fce6b0038f8e351fa4166d0d0eaeda8fa59935aab750d3ef
SHA512bd48be5bef1eb0897d880427d9302cfc6782490150d9f42373c0f2bd49f63d8771db6f0a34be2449068fd5e425fa747353ec4fd0c6bf5d454f4fae1f55d4290a
-
Filesize
168KB
MD53c4b3490ecb3a2200ee4fb4aa522dd4c
SHA13adb6134f9ad081c41e022578f83628cdcc6197d
SHA2568452c2afdedc2d8b30ebd0438eb4f4dc02b029b9163f7f6df1e6535f0b075cb8
SHA5128a6f964969c5617b8b841ea0682eeb1f62a7015ffd2c82787bbea595595815c9d2913f01e6e1a26365c5a7b769a22780eadbe5f2ba6ef1ff15e140c3d8e7bd5a
-
Filesize
168KB
MD57ad4ee2e053d7a70b772260b4e9ec9a8
SHA1aa851505636d4657045a9475817b34b5d6e06eb6
SHA256d7279ddf040d27e7e6aabcae33ab4d47fa37809bcff03702f8720b5ca2f45358
SHA51230f70bf9c1c741a99ad54d5b402b7b85559742fc2a21bb330395a663a3500212cbdeca688a69901b0c5b796d6823441fb540951f046e893ab76096c3ed359aba
-
Filesize
168KB
MD52ec374fdb94f986bec9254323181c90b
SHA19859af686120ea478b301c94e77718d788037813
SHA256c46e2b59f3fd1bb33c23e74225450f2936ac508b3a5d2df19933f0d1e8e91766
SHA5127ca3de1f80e9586de523aefa864f5735ba81f239824d6c0c4c570181aa1b2601898bcca40709177971fe9d2d5773f672cd30a3d061c49e211f00f9dcfc0a9bf8
-
Filesize
168KB
MD562d977cadd58b13b016f70598c00230c
SHA1762bcb8f986e5706055eadf233944d4b2a8e4de3
SHA256ece126232b03dbc363806de5a3bae9d42878805470c3772aa1e7e0414614a3d7
SHA512b270ab37bdd70ef4e971fa94867c325c0231055a86353d90b1e6c0aed50efa3115301092ceea57b4043e0a9b12ca3eceb072e04f58abe6f8faee747028ba3125
-
Filesize
168KB
MD58653b430c62e17ab5f3d911c2bc92237
SHA1e2698703982324188cf452427970f7d9c7137987
SHA256d5c892083263e67d10bf7572542af0de519b0d9a113c757a5f88bcca3a1c3681
SHA512b63abab5504e9be846dd82a633abbf9ca44e0c988a8d5e92e620bbf92195ca035678063d2d67b64eab98299f19a6b5095dc1fc9ca09045beb265774774ead74d