Analysis
-
max time kernel
144s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
-
Size
408KB
-
MD5
0d0f19492a17885ada66c4cee0fa248f
-
SHA1
3456bc24c93dede7d24a7f1332da33c5ba683c87
-
SHA256
52ce7323543ab48ed9a816a8ceb1c67b4fabb0d8309ba2bc170569f7df0aacb5
-
SHA512
c0eed661878c4fcbd15a8374491166847805d7dc539ef02b6dfbe8d680e1bdbc5c78977b84be7fed9a17e68e7363f7e1fc1daa30b26412d07e448d1818bd2f08
-
SSDEEP
3072:CEGh0oAl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGyldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}\stubpath = "C:\\Windows\\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe" {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C8175C8-D473-41f5-9580-FEE268BA2D3E} {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3072667-FBAB-4797-95CC-9B0CE024ACDD} {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A676109-4E12-4e77-97D3-5731A2F4C41B}\stubpath = "C:\\Windows\\{7A676109-4E12-4e77-97D3-5731A2F4C41B}.exe" {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15D30CCA-9B6E-460b-9722-A5E259489BB7}\stubpath = "C:\\Windows\\{15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe" {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83} {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}\stubpath = "C:\\Windows\\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe" {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15D30CCA-9B6E-460b-9722-A5E259489BB7} {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A664382-B129-478d-9241-1D82409F36F3} {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A664382-B129-478d-9241-1D82409F36F3}\stubpath = "C:\\Windows\\{2A664382-B129-478d-9241-1D82409F36F3}.exe" {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DECB95E6-8A9D-497c-A27F-86032B671F7B} {2A664382-B129-478d-9241-1D82409F36F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79E08CD0-23A2-48a8-AB57-950C1114670D} {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476} 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476}\stubpath = "C:\\Windows\\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe" 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F} {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7A676109-4E12-4e77-97D3-5731A2F4C41B} {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{79E08CD0-23A2-48a8-AB57-950C1114670D}\stubpath = "C:\\Windows\\{79E08CD0-23A2-48a8-AB57-950C1114670D}.exe" {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C3072667-FBAB-4797-95CC-9B0CE024ACDD}\stubpath = "C:\\Windows\\{C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe" {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}\stubpath = "C:\\Windows\\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe" {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DECB95E6-8A9D-497c-A27F-86032B671F7B}\stubpath = "C:\\Windows\\{DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe" {2A664382-B129-478d-9241-1D82409F36F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB} {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C8175C8-D473-41f5-9580-FEE268BA2D3E}\stubpath = "C:\\Windows\\{0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe" {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 2136 {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe 2984 {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe 2160 {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe 1936 {7A676109-4E12-4e77-97D3-5731A2F4C41B}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe {2A664382-B129-478d-9241-1D82409F36F3}.exe File created C:\Windows\{79E08CD0-23A2-48a8-AB57-950C1114670D}.exe {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe File created C:\Windows\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe File created C:\Windows\{0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe File created C:\Windows\{7A676109-4E12-4e77-97D3-5731A2F4C41B}.exe {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe File created C:\Windows\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe File created C:\Windows\{2A664382-B129-478d-9241-1D82409F36F3}.exe {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe File created C:\Windows\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe File created C:\Windows\{C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe File created C:\Windows\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe File created C:\Windows\{15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2A664382-B129-478d-9241-1D82409F36F3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7A676109-4E12-4e77-97D3-5731A2F4C41B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Token: SeIncBasePriorityPrivilege 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe Token: SeIncBasePriorityPrivilege 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe Token: SeIncBasePriorityPrivilege 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe Token: SeIncBasePriorityPrivilege 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe Token: SeIncBasePriorityPrivilege 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe Token: SeIncBasePriorityPrivilege 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe Token: SeIncBasePriorityPrivilege 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe Token: SeIncBasePriorityPrivilege 2136 {C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe Token: SeIncBasePriorityPrivilege 2984 {1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe Token: SeIncBasePriorityPrivilege 2160 {0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1960 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 29 PID 2592 wrote to memory of 1960 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 29 PID 2592 wrote to memory of 1960 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 29 PID 2592 wrote to memory of 1960 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 29 PID 2592 wrote to memory of 2764 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 30 PID 2592 wrote to memory of 2764 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 30 PID 2592 wrote to memory of 2764 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 30 PID 2592 wrote to memory of 2764 2592 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 30 PID 1960 wrote to memory of 2768 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 31 PID 1960 wrote to memory of 2768 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 31 PID 1960 wrote to memory of 2768 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 31 PID 1960 wrote to memory of 2768 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 31 PID 1960 wrote to memory of 2820 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 32 PID 1960 wrote to memory of 2820 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 32 PID 1960 wrote to memory of 2820 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 32 PID 1960 wrote to memory of 2820 1960 {EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe 32 PID 2768 wrote to memory of 2636 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 33 PID 2768 wrote to memory of 2636 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 33 PID 2768 wrote to memory of 2636 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 33 PID 2768 wrote to memory of 2636 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 33 PID 2768 wrote to memory of 2668 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 34 PID 2768 wrote to memory of 2668 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 34 PID 2768 wrote to memory of 2668 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 34 PID 2768 wrote to memory of 2668 2768 {FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe 34 PID 2636 wrote to memory of 2292 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 35 PID 2636 wrote to memory of 2292 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 35 PID 2636 wrote to memory of 2292 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 35 PID 2636 wrote to memory of 2292 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 35 PID 2636 wrote to memory of 1120 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 36 PID 2636 wrote to memory of 1120 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 36 PID 2636 wrote to memory of 1120 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 36 PID 2636 wrote to memory of 1120 2636 {15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe 36 PID 2292 wrote to memory of 1756 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 37 PID 2292 wrote to memory of 1756 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 37 PID 2292 wrote to memory of 1756 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 37 PID 2292 wrote to memory of 1756 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 37 PID 2292 wrote to memory of 2124 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 38 PID 2292 wrote to memory of 2124 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 38 PID 2292 wrote to memory of 2124 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 38 PID 2292 wrote to memory of 2124 2292 {CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe 38 PID 1756 wrote to memory of 2932 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 39 PID 1756 wrote to memory of 2932 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 39 PID 1756 wrote to memory of 2932 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 39 PID 1756 wrote to memory of 2932 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 39 PID 1756 wrote to memory of 1156 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 40 PID 1756 wrote to memory of 1156 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 40 PID 1756 wrote to memory of 1156 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 40 PID 1756 wrote to memory of 1156 1756 {2A664382-B129-478d-9241-1D82409F36F3}.exe 40 PID 2932 wrote to memory of 2528 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 41 PID 2932 wrote to memory of 2528 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 41 PID 2932 wrote to memory of 2528 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 41 PID 2932 wrote to memory of 2528 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 41 PID 2932 wrote to memory of 2904 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 42 PID 2932 wrote to memory of 2904 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 42 PID 2932 wrote to memory of 2904 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 42 PID 2932 wrote to memory of 2904 2932 {DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe 42 PID 2528 wrote to memory of 2136 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 43 PID 2528 wrote to memory of 2136 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 43 PID 2528 wrote to memory of 2136 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 43 PID 2528 wrote to memory of 2136 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 43 PID 2528 wrote to memory of 1084 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 44 PID 2528 wrote to memory of 1084 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 44 PID 2528 wrote to memory of 1084 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 44 PID 2528 wrote to memory of 1084 2528 {79E08CD0-23A2-48a8-AB57-950C1114670D}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exeC:\Windows\{EDE12397-A9CD-4b2d-9BEB-FB079A77C476}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exeC:\Windows\{FAD810AE-16DF-435a-9E0A-EC6FE3EF504F}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\{15D30CCA-9B6E-460b-9722-A5E259489BB7}.exeC:\Windows\{15D30CCA-9B6E-460b-9722-A5E259489BB7}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exeC:\Windows\{CF3ED2BC-DA36-4540-BCF5-EE8301A9EA83}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\{2A664382-B129-478d-9241-1D82409F36F3}.exeC:\Windows\{2A664382-B129-478d-9241-1D82409F36F3}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\{DECB95E6-8A9D-497c-A27F-86032B671F7B}.exeC:\Windows\{DECB95E6-8A9D-497c-A27F-86032B671F7B}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\{79E08CD0-23A2-48a8-AB57-950C1114670D}.exeC:\Windows\{79E08CD0-23A2-48a8-AB57-950C1114670D}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\{C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exeC:\Windows\{C3072667-FBAB-4797-95CC-9B0CE024ACDD}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exeC:\Windows\{1AFF0DB2-EB33-4bd5-AAB7-B3A32B2482FB}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\{0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exeC:\Windows\{0C8175C8-D473-41f5-9580-FEE268BA2D3E}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\{7A676109-4E12-4e77-97D3-5731A2F4C41B}.exeC:\Windows\{7A676109-4E12-4e77-97D3-5731A2F4C41B}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C817~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AFF0~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C3072~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{79E08~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DECB9~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2A664~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CF3ED~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15D30~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FAD81~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDE12~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD597de3113e7ef808a966e18ae77bd7405
SHA196b2fe5e57370cf25d30ea699191a7e8645515d8
SHA256f3f006f2c36a151c7eac11d711ed0784cf6e988edfdae193d14f7d18353d3d96
SHA5123362b954cbbc82b705d51927419397eeb19131ca31f5da8b9893e47ffd2022225ffdba7437bcd2c31f20f51e91f70037c1f51250ae11a0854616142950051164
-
Filesize
408KB
MD53099f5afdad3576c8a30b1cc0e7e268e
SHA148e1c2773ad131d3edc87891b11ad06e20cf4689
SHA256604a7efc992a4f68f9bb0a51fe7181b5864fc2480706e8fca1b3a72dbfeda426
SHA5124baffa48e0f5f4b4909c82cf40ec489d3e605103a27b124eddace91f23e6a79339ac948db81ac84bf2ad325a2440bf29f7fe192ec34852024ef493ea44a3a3c0
-
Filesize
408KB
MD5099af2881333f3ac87ae184b66d76465
SHA1f3a423b8238b60db796db0121f42db850b4d408d
SHA256a700e3754a530d27cc558a69761026da2b2e6fb359096c3dcb1b92ad15cfc4bc
SHA5125d3cafb3873c2d8882116e24b32130309fd9908f309651158dba02fb004cbe698e799dcfe16d66d5a5b87dcb01c13e3bd204e2f19fba4d259cc66eba8b7ac7e1
-
Filesize
408KB
MD5feee40ab23fa0bca92e4d7389f800390
SHA1336b662d7cbee8056bd8bbcf7e73e95a0a3ef7c6
SHA2562716f043582d170d7608cf7f0959ca1fd1e2c67a02f933c7eda9542577628a0f
SHA512edff3be55ced7c30d22d7a07840b54940038038854c4ffdee40cfd9f65b63e2a9d23c8ad77b9f1bf743426f343f3a56c988c7aaba9d64e2ef5e39d56d80e6f4d
-
Filesize
408KB
MD5ec23a25e1a07f70d01843f9c10a1c78f
SHA11041df4d095a11fd3dad4a904c48fc5168e67a4c
SHA2562deeeb3e093c5885bcba157127a29c7be093b59ca6e1e3749a99d1a6f3c25568
SHA5123b45090aaf20cada3854a4ab839d3a29498d0f080b635dfbd6a97085c6ad5f23cfa46a2d9164383c59953a4b6fd76378bf60450d8cda9671dd39c34c0c56542e
-
Filesize
408KB
MD5ec69db0aed0ce2e0d5386826e445e226
SHA18c70639f5471192f45833f75a26f513219fe2df1
SHA25625f36d80a144a1051833e671feeb198a836398e6c936b40505d5973206f8661d
SHA51237f3383705ac10563bebce038df97f3a68105b633e6cf74c2fc90539e4174058e4bf5b7221bff60042ecc836802465c2193b7fc620ed72a7a7ffc2fc1803dab6
-
Filesize
408KB
MD5256c91d6f18f2a20dee5bad83f3ea1df
SHA17f57738ba09a640fe126fdabb73fc3b00420b5b5
SHA256c0e1cd0a6c25411fe6070944c690b0a650fe0fb94683c42c903810fd8e683c3f
SHA512c427c6b1cc1d696365a896a6ef5d9fa94e39e4e13dd68a5444e303d2d58a4a82f07364e96f4b8d1d5e6645c5bc9db566554512a21fc91bf09ef99a9ae7a5ef48
-
Filesize
408KB
MD5843c532ad8400342afc757eddb6a03b5
SHA12c5cbd7aa280c10fcf436b4adea457662497a5e8
SHA256003d1e54a68e90d78849e5f35b29d69a645c90afffd12ea805321e136402936f
SHA512d6043c8a087ad9f6a4330779859441da3fcba0105b3426f3cbf2edab09f689d7a7a871338656c74f98645d9ecdbcb902eac51814637c53da1d663c5291a352c9
-
Filesize
408KB
MD5f434c860a48737b3a5db0968ab978e6e
SHA1c1c22f6d3afd3cdc0eb20b9e9d289f23d34832e5
SHA256a8a067f96006ca5ae7931546b6023f63f0993d1892a6637d5723b42bd32932a4
SHA51264a926cc6a10071ad36017ae854fe9822ffb2d1c8747597b065f213bb792c88fe6194f2dcff4eebfdf8fa05cf0c5cc020c0d23183a307287786bcf12a59f5bcf
-
Filesize
408KB
MD58d6733761199dc07da809ca7a8600e14
SHA1fb24dab0d0abbe16a701e9ff493de1df00a8b65a
SHA2561ddb6690b71bdc9504b4df73b396a983aa32cd9929a7eacd6f0c20e7c8168ab7
SHA512b700da93df2b7907e42a49f83f2424ffc48a88e924634a7b7818da2e48592b17afc59ad99982da73b0159710782fe0cbfe3c0838f6db2a0c1ccc6fc8d3e142c3
-
Filesize
408KB
MD52b598003402a1acf69cdc9ce13a72752
SHA17f1d59a8c8badddba68290a99622edcc9eda1490
SHA25665a0c82c37e9c27e2d8650f69a3b80482b79cfe5e7b7df206feffec55db72652
SHA51250e497aae4cc772a77fafb9295ea41a2ca765007ae414798f2d94022373d9f7bcb7eaf637d262b8a739c1af4ffc80fe78e6082c4bcec420c00ee6299af8eed8c