Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe
-
Size
344KB
-
MD5
18f5c4f2658d54de57a890bde395631e
-
SHA1
11717d1ebc7e2d41723f3af3ce0c67c378aba0b8
-
SHA256
8bf7067fac31c2ccdac94dcb32abcb3b5b75acbe2ad5265d9673be1e1e6ec7d8
-
SHA512
f3389819174e6008358ff31b7aee176585e6629d1041fdfe216bd909d4176f427feac029a8394bbf5515bf15097bb0e1b2cdc4880602f85b466971cbe0a4b70c
-
SSDEEP
3072:mEGh0ohlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGPlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{83CB32DF-3E95-4fdf-905E-499AD2C34116}\stubpath = "C:\\Windows\\{83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe" {E53E5527-6063-4d24-8510-89F86F62DF70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E2FE422-803E-4e86-A1D8-96F0289C2F68}\stubpath = "C:\\Windows\\{4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe" 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFAC37B-5FCA-425e-AD90-4220973EB17E}\stubpath = "C:\\Windows\\{9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe" {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B323307D-3856-42a5-BEF5-1A9D2A9710C9} {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B323307D-3856-42a5-BEF5-1A9D2A9710C9}\stubpath = "C:\\Windows\\{B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe" {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12216837-4BA9-40ae-999C-E791AC8E1BDF}\stubpath = "C:\\Windows\\{12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe" {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC} {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{83CB32DF-3E95-4fdf-905E-499AD2C34116} {E53E5527-6063-4d24-8510-89F86F62DF70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{838D469D-124D-475c-A2DA-6E93DFF76B12}\stubpath = "C:\\Windows\\{838D469D-124D-475c-A2DA-6E93DFF76B12}.exe" {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4E2FE422-803E-4e86-A1D8-96F0289C2F68} 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295} {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295}\stubpath = "C:\\Windows\\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe" {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AF75D726-3496-42cf-BAFD-53819D7ECD4D} {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AF75D726-3496-42cf-BAFD-53819D7ECD4D}\stubpath = "C:\\Windows\\{AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe" {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}\stubpath = "C:\\Windows\\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe" {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E53E5527-6063-4d24-8510-89F86F62DF70}\stubpath = "C:\\Windows\\{E53E5527-6063-4d24-8510-89F86F62DF70}.exe" {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3632DB80-3DD2-4008-A8A3-142AAC197599} {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3632DB80-3DD2-4008-A8A3-142AAC197599}\stubpath = "C:\\Windows\\{3632DB80-3DD2-4008-A8A3-142AAC197599}.exe" {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12216837-4BA9-40ae-999C-E791AC8E1BDF} {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E53E5527-6063-4d24-8510-89F86F62DF70} {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{838D469D-124D-475c-A2DA-6E93DFF76B12} {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}\stubpath = "C:\\Windows\\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exe" {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFAC37B-5FCA-425e-AD90-4220973EB17E} {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F} {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe -
Executes dropped EXE 12 IoCs
pid Process 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe 4996 {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe 3368 {EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe File created C:\Windows\{12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe File created C:\Windows\{E53E5527-6063-4d24-8510-89F86F62DF70}.exe {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe File created C:\Windows\{83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe {E53E5527-6063-4d24-8510-89F86F62DF70}.exe File created C:\Windows\{9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe File created C:\Windows\{B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe File created C:\Windows\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe File created C:\Windows\{3632DB80-3DD2-4008-A8A3-142AAC197599}.exe {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe File created C:\Windows\{AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe File created C:\Windows\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe File created C:\Windows\{838D469D-124D-475c-A2DA-6E93DFF76B12}.exe {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe File created C:\Windows\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exe {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E53E5527-6063-4d24-8510-89F86F62DF70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe Token: SeIncBasePriorityPrivilege 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe Token: SeIncBasePriorityPrivilege 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe Token: SeIncBasePriorityPrivilege 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe Token: SeIncBasePriorityPrivilege 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe Token: SeIncBasePriorityPrivilege 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe Token: SeIncBasePriorityPrivilege 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe Token: SeIncBasePriorityPrivilege 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe Token: SeIncBasePriorityPrivilege 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe Token: SeIncBasePriorityPrivilege 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe Token: SeIncBasePriorityPrivilege 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe Token: SeIncBasePriorityPrivilege 4996 {838D469D-124D-475c-A2DA-6E93DFF76B12}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3832 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 86 PID 4632 wrote to memory of 3832 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 86 PID 4632 wrote to memory of 3832 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 86 PID 4632 wrote to memory of 2788 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 87 PID 4632 wrote to memory of 2788 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 87 PID 4632 wrote to memory of 2788 4632 2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe 87 PID 3832 wrote to memory of 3512 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 93 PID 3832 wrote to memory of 3512 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 93 PID 3832 wrote to memory of 3512 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 93 PID 3832 wrote to memory of 2816 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 94 PID 3832 wrote to memory of 2816 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 94 PID 3832 wrote to memory of 2816 3832 {4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe 94 PID 3512 wrote to memory of 1968 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 97 PID 3512 wrote to memory of 1968 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 97 PID 3512 wrote to memory of 1968 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 97 PID 3512 wrote to memory of 3744 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 98 PID 3512 wrote to memory of 3744 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 98 PID 3512 wrote to memory of 3744 3512 {9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe 98 PID 1968 wrote to memory of 2044 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 99 PID 1968 wrote to memory of 2044 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 99 PID 1968 wrote to memory of 2044 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 99 PID 1968 wrote to memory of 2860 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 100 PID 1968 wrote to memory of 2860 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 100 PID 1968 wrote to memory of 2860 1968 {B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe 100 PID 2044 wrote to memory of 3912 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 101 PID 2044 wrote to memory of 3912 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 101 PID 2044 wrote to memory of 3912 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 101 PID 2044 wrote to memory of 836 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 102 PID 2044 wrote to memory of 836 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 102 PID 2044 wrote to memory of 836 2044 {8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe 102 PID 3912 wrote to memory of 2824 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 103 PID 3912 wrote to memory of 2824 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 103 PID 3912 wrote to memory of 2824 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 103 PID 3912 wrote to memory of 4320 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 104 PID 3912 wrote to memory of 4320 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 104 PID 3912 wrote to memory of 4320 3912 {3632DB80-3DD2-4008-A8A3-142AAC197599}.exe 104 PID 2824 wrote to memory of 1540 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 105 PID 2824 wrote to memory of 1540 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 105 PID 2824 wrote to memory of 1540 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 105 PID 2824 wrote to memory of 3704 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 106 PID 2824 wrote to memory of 3704 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 106 PID 2824 wrote to memory of 3704 2824 {AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe 106 PID 1540 wrote to memory of 5024 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 107 PID 1540 wrote to memory of 5024 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 107 PID 1540 wrote to memory of 5024 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 107 PID 1540 wrote to memory of 5008 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 108 PID 1540 wrote to memory of 5008 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 108 PID 1540 wrote to memory of 5008 1540 {12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe 108 PID 5024 wrote to memory of 3492 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 109 PID 5024 wrote to memory of 3492 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 109 PID 5024 wrote to memory of 3492 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 109 PID 5024 wrote to memory of 4588 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 110 PID 5024 wrote to memory of 4588 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 110 PID 5024 wrote to memory of 4588 5024 {B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe 110 PID 3492 wrote to memory of 4828 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 111 PID 3492 wrote to memory of 4828 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 111 PID 3492 wrote to memory of 4828 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 111 PID 3492 wrote to memory of 2656 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 112 PID 3492 wrote to memory of 2656 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 112 PID 3492 wrote to memory of 2656 3492 {E53E5527-6063-4d24-8510-89F86F62DF70}.exe 112 PID 4828 wrote to memory of 4996 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe 113 PID 4828 wrote to memory of 4996 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe 113 PID 4828 wrote to memory of 4996 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe 113 PID 4828 wrote to memory of 2412 4828 {83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-05_18f5c4f2658d54de57a890bde395631e_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\{4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exeC:\Windows\{4E2FE422-803E-4e86-A1D8-96F0289C2F68}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\{9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exeC:\Windows\{9AFAC37B-5FCA-425e-AD90-4220973EB17E}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\{B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exeC:\Windows\{B323307D-3856-42a5-BEF5-1A9D2A9710C9}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exeC:\Windows\{8E2DA52A-F245-4bba-A2EA-4B570CE7B295}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\{3632DB80-3DD2-4008-A8A3-142AAC197599}.exeC:\Windows\{3632DB80-3DD2-4008-A8A3-142AAC197599}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\{AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exeC:\Windows\{AF75D726-3496-42cf-BAFD-53819D7ECD4D}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\{12216837-4BA9-40ae-999C-E791AC8E1BDF}.exeC:\Windows\{12216837-4BA9-40ae-999C-E791AC8E1BDF}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exeC:\Windows\{B0FBE1AC-4D93-4c82-8BF2-A3C6DB10E3CC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\{E53E5527-6063-4d24-8510-89F86F62DF70}.exeC:\Windows\{E53E5527-6063-4d24-8510-89F86F62DF70}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\{83CB32DF-3E95-4fdf-905E-499AD2C34116}.exeC:\Windows\{83CB32DF-3E95-4fdf-905E-499AD2C34116}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\{838D469D-124D-475c-A2DA-6E93DFF76B12}.exeC:\Windows\{838D469D-124D-475c-A2DA-6E93DFF76B12}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4996 -
C:\Windows\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exeC:\Windows\{EA47FBFA-AE14-47e4-9A68-64E30D74FB8F}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{838D4~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{83CB3~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E53E5~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B0FBE~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{12216~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AF75D~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3632D~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8E2DA~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3233~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AFAC~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4E2FE~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5a9db529c2c13104a692db27627e678b2
SHA17865c41832f520f1dd253e66e9b155ffe15984a0
SHA256176330233affa11200617a512f33f7c5aa4379113081f84ff8d14650af74eb67
SHA51289bb6fbc80c51c65a72c94d1d6d4340552a94246b4b2561aebe2c792f27ee043cc01b736aa0a80d9e0c6173ea5417703074ab1ffb639e38aa44cdb8d2c951333
-
Filesize
344KB
MD53366275cce336e6a4f8604d4a6ca08d1
SHA1566c4e4f04d9db2c5aaabf9ebf00ce12c46ee81f
SHA25688a0ccb961678b5f269a5926187e2fe34221a73296b8c00c031080f76f9e8ecc
SHA512f92b8e4d4e11fcbb7896621fa28b8145a29a6b4f1bc6cfe23ed96568c8c0f27464e3d23f6041232f295ddf6c3fc2f28d5d400aaa0f6125d025aaaa263c74a11a
-
Filesize
344KB
MD5c65fb16f29350caa2e98f5e87aaf0788
SHA13f3e0fb87792cffa03b985143ff339a4586d17fe
SHA256b81cef89570bcb8749181ae323c235737c320b1e67de5df91e0f3de589f49dcd
SHA512175ddf9ac38d1fb0a1ab8463bb1354d134b3c3e3c073961d5301c07112df36f93473a81af61e078e4b7bb0e7d1bffc2d12710c6dec657c61aeaca54e25965ea2
-
Filesize
344KB
MD5bcd45d922ef637918b63b2c8342ad2c8
SHA15fd04277e825155d45a14b4759a3d1ceb26bbaed
SHA2569a916ce433672b61f414aba8eb66fb1edafd0ff5c215ac99f5179bc0f0bfbcb3
SHA5126a36d0595ced29c1cb8b020a6526b226ec22f5748d76e0beeb7641264ad293467f996b5c53cb8992049f01f360748ca0423aaceee378e5231de8f710245b7f67
-
Filesize
344KB
MD565b0ab4e8fd63ef08ca81dfce917b29c
SHA1bb26eb94bc0169dbd4a11abb2d6f38b235f78777
SHA2565014625988d202f277c91422d20c356a7cb0cf3289a62ac0a18b979f4f7cd02e
SHA512b22aeccec778a8330a60ffcc99683cff24742a0e5871557406453916434b447d9187d6d472d6dc9d5e3ec0f91e62068b98963178041b4125e99650c28414ab65
-
Filesize
344KB
MD5856ab04efc620d69511e3adb7b4dcb11
SHA117adce6cfc0988ab088ea14434ed6a30c3192191
SHA256c270cdc314d464650649e5c3a5f4b486d8c4632a4424641b0d1664fc86115fc3
SHA512d6caac47e4a7d9f441029e3cd6fa7f69b0acf25431f81cc962083076863476298ed770fbdbed8069e2ee4bfed5a4df18088740fecbc8dfc743210dfd530fd71f
-
Filesize
344KB
MD5a01eac978afb4e2df723d76c8478a9e8
SHA1cd0535e96ca920145fa06abee76f0b2af4b5c22d
SHA2564fc5bc9455380c25bd602e8e1b734afa0cf5a99f7076263194b20a7efb5d8411
SHA512722cbf6b8dfd091fa251d82a12fca7b667154b4b6b2bb595c8132fbad4a4833f133b74cef6929e5ac0e69bb59fe95c9313bd61cb19f53e6115bb544d845c4e2e
-
Filesize
344KB
MD50edd8a124b062a086bb60c9c62b69d26
SHA1c7b3a98d87473e7342e3cc00ff0715dc2bab5772
SHA256d43163a887ab44ac6a0d8c8f85c65bf105d535476a35f7041b39675453af1a05
SHA5125e40be59170de0c14e69ef0d621139861a608bb86e52f9654c27741d202030948219451c816c11eb8cfb95a8224e4392ea4a9cd3decef4ea8ab36a41ad4e6d03
-
Filesize
344KB
MD57b42c852fdd8a6b2f551afbf6127a0ff
SHA15d13c5fc16222f77718b330038d36ae48c15b709
SHA25670fc395b5ed7ae221f2618cfa4f78397a04fa47f7101a2691ed5bcb10f3f9807
SHA5121bf78c6a393a1c91d26a7a5e5cec7096acf954c162ddd6519c27f9873605cd0c53f824fb4a0ee8947a0eb503d48a67219600050368792320045ad81f86a5dc07
-
Filesize
344KB
MD586164afcc2a10d9914204e8cbc1e7507
SHA1636bb0c3a7a1514420570b9a06f2d05246b5767a
SHA2561bdb97086569b28ab638238b63e3487b8cfe27949738b7e7cbc735ef665607a4
SHA512cd32455ba3597f803062c74354f3d08bbc2e08f2613e9454eefbb7e1081eb5834bdfb722efa33ddd7b89672adc228053008637eb8b8e28f4a84b4d376e0a0e94
-
Filesize
344KB
MD5befa6c99ece1658b86a809d53dede00e
SHA191b5fdb4eb785549483612c62d7cc384e38195e2
SHA25687dea0e15ba7269a3a79b3d1f09a1bb2a9991340c9cb278a57a0982c171290dd
SHA512aebaee8d5644aad90442be0b62d337515eb567ac4c69c9e60b561381d8637981f6b7261bdfa6e71e17739168b17bd2bc6ff368fe567b4a0dbcf04f634704afca
-
Filesize
344KB
MD5431ddc29c95227288fbcb803615c9d0d
SHA1112915fb5373c97a8ef3c76cba1d72eb2539e4c3
SHA2562564186d3085524297fd42caf242f0ad5c9acf956812740389255c51d6bd847d
SHA512e72aa6c6ee97c51bdf55bc6ce296b9d8d395a81b72a197257de610a01b556cc020bfdff215cf211703950d635571cc67b1d69aa092a1e3c6c3b1162f42b240c5