Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe
-
Size
408KB
-
MD5
0d0f19492a17885ada66c4cee0fa248f
-
SHA1
3456bc24c93dede7d24a7f1332da33c5ba683c87
-
SHA256
52ce7323543ab48ed9a816a8ceb1c67b4fabb0d8309ba2bc170569f7df0aacb5
-
SHA512
c0eed661878c4fcbd15a8374491166847805d7dc539ef02b6dfbe8d680e1bdbc5c78977b84be7fed9a17e68e7363f7e1fc1daa30b26412d07e448d1818bd2f08
-
SSDEEP
3072:CEGh0oAl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGyldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0} 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{609D5266-1258-4f28-90AE-42D789B004A8}\stubpath = "C:\\Windows\\{609D5266-1258-4f28-90AE-42D789B004A8}.exe" {9B8D438A-3524-4292-95FE-01D9AD256906}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8} {609D5266-1258-4f28-90AE-42D789B004A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0} {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3} {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}\stubpath = "C:\\Windows\\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe" {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}\stubpath = "C:\\Windows\\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exe" {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0}\stubpath = "C:\\Windows\\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe" 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{712CDE77-DE44-474d-B886-E7CAC12D1551}\stubpath = "C:\\Windows\\{712CDE77-DE44-474d-B886-E7CAC12D1551}.exe" {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D37AEB7-07C5-4ba1-85CD-811772DD7101}\stubpath = "C:\\Windows\\{7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe" {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352} {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352}\stubpath = "C:\\Windows\\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe" {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8D438A-3524-4292-95FE-01D9AD256906} {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2} {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD} {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{712CDE77-DE44-474d-B886-E7CAC12D1551} {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D37AEB7-07C5-4ba1-85CD-811772DD7101} {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B8D438A-3524-4292-95FE-01D9AD256906}\stubpath = "C:\\Windows\\{9B8D438A-3524-4292-95FE-01D9AD256906}.exe" {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}\stubpath = "C:\\Windows\\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe" {609D5266-1258-4f28-90AE-42D789B004A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E} {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}\stubpath = "C:\\Windows\\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe" {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{609D5266-1258-4f28-90AE-42D789B004A8} {9B8D438A-3524-4292-95FE-01D9AD256906}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0}\stubpath = "C:\\Windows\\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe" {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}\stubpath = "C:\\Windows\\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe" {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe -
Executes dropped EXE 12 IoCs
pid Process 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe 992 {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe 928 {1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe File created C:\Windows\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe File created C:\Windows\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exe {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe File created C:\Windows\{712CDE77-DE44-474d-B886-E7CAC12D1551}.exe {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe File created C:\Windows\{7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe File created C:\Windows\{609D5266-1258-4f28-90AE-42D789B004A8}.exe {9B8D438A-3524-4292-95FE-01D9AD256906}.exe File created C:\Windows\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe {609D5266-1258-4f28-90AE-42D789B004A8}.exe File created C:\Windows\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe File created C:\Windows\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe File created C:\Windows\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe File created C:\Windows\{9B8D438A-3524-4292-95FE-01D9AD256906}.exe {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe File created C:\Windows\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9B8D438A-3524-4292-95FE-01D9AD256906}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {609D5266-1258-4f28-90AE-42D789B004A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe Token: SeIncBasePriorityPrivilege 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe Token: SeIncBasePriorityPrivilege 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe Token: SeIncBasePriorityPrivilege 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe Token: SeIncBasePriorityPrivilege 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe Token: SeIncBasePriorityPrivilege 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe Token: SeIncBasePriorityPrivilege 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe Token: SeIncBasePriorityPrivilege 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe Token: SeIncBasePriorityPrivilege 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe Token: SeIncBasePriorityPrivilege 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe Token: SeIncBasePriorityPrivilege 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe Token: SeIncBasePriorityPrivilege 992 {FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4204 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 89 PID 1508 wrote to memory of 4204 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 89 PID 1508 wrote to memory of 4204 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 89 PID 1508 wrote to memory of 372 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 90 PID 1508 wrote to memory of 372 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 90 PID 1508 wrote to memory of 372 1508 2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe 90 PID 4204 wrote to memory of 4188 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 93 PID 4204 wrote to memory of 4188 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 93 PID 4204 wrote to memory of 4188 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 93 PID 4204 wrote to memory of 2448 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 94 PID 4204 wrote to memory of 2448 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 94 PID 4204 wrote to memory of 2448 4204 {35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe 94 PID 4188 wrote to memory of 940 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 97 PID 4188 wrote to memory of 940 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 97 PID 4188 wrote to memory of 940 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 97 PID 4188 wrote to memory of 1868 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 98 PID 4188 wrote to memory of 1868 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 98 PID 4188 wrote to memory of 1868 4188 {712CDE77-DE44-474d-B886-E7CAC12D1551}.exe 98 PID 940 wrote to memory of 2552 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 99 PID 940 wrote to memory of 2552 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 99 PID 940 wrote to memory of 2552 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 99 PID 940 wrote to memory of 376 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 100 PID 940 wrote to memory of 376 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 100 PID 940 wrote to memory of 376 940 {7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe 100 PID 2552 wrote to memory of 1152 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 101 PID 2552 wrote to memory of 1152 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 101 PID 2552 wrote to memory of 1152 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 101 PID 2552 wrote to memory of 1056 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 102 PID 2552 wrote to memory of 1056 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 102 PID 2552 wrote to memory of 1056 2552 {3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe 102 PID 1152 wrote to memory of 3244 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 103 PID 1152 wrote to memory of 3244 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 103 PID 1152 wrote to memory of 3244 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 103 PID 1152 wrote to memory of 1236 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 104 PID 1152 wrote to memory of 1236 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 104 PID 1152 wrote to memory of 1236 1152 {9B8D438A-3524-4292-95FE-01D9AD256906}.exe 104 PID 3244 wrote to memory of 2512 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 105 PID 3244 wrote to memory of 2512 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 105 PID 3244 wrote to memory of 2512 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 105 PID 3244 wrote to memory of 3728 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 106 PID 3244 wrote to memory of 3728 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 106 PID 3244 wrote to memory of 3728 3244 {609D5266-1258-4f28-90AE-42D789B004A8}.exe 106 PID 2512 wrote to memory of 4944 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 107 PID 2512 wrote to memory of 4944 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 107 PID 2512 wrote to memory of 4944 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 107 PID 2512 wrote to memory of 2348 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 108 PID 2512 wrote to memory of 2348 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 108 PID 2512 wrote to memory of 2348 2512 {B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe 108 PID 4944 wrote to memory of 4332 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 109 PID 4944 wrote to memory of 4332 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 109 PID 4944 wrote to memory of 4332 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 109 PID 4944 wrote to memory of 2488 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 110 PID 4944 wrote to memory of 2488 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 110 PID 4944 wrote to memory of 2488 4944 {9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe 110 PID 4332 wrote to memory of 1472 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 111 PID 4332 wrote to memory of 1472 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 111 PID 4332 wrote to memory of 1472 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 111 PID 4332 wrote to memory of 2676 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 112 PID 4332 wrote to memory of 2676 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 112 PID 4332 wrote to memory of 2676 4332 {211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe 112 PID 1472 wrote to memory of 992 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe 113 PID 1472 wrote to memory of 992 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe 113 PID 1472 wrote to memory of 992 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe 113 PID 1472 wrote to memory of 1996 1472 {8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-06_0d0f19492a17885ada66c4cee0fa248f_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exeC:\Windows\{35FADD8E-9EFA-46a2-8A52-74A80FE957A0}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\{712CDE77-DE44-474d-B886-E7CAC12D1551}.exeC:\Windows\{712CDE77-DE44-474d-B886-E7CAC12D1551}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\{7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exeC:\Windows\{7D37AEB7-07C5-4ba1-85CD-811772DD7101}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exeC:\Windows\{3AB7FA27-7333-44fe-AD6E-9F95E9A67352}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\{9B8D438A-3524-4292-95FE-01D9AD256906}.exeC:\Windows\{9B8D438A-3524-4292-95FE-01D9AD256906}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\{609D5266-1258-4f28-90AE-42D789B004A8}.exeC:\Windows\{609D5266-1258-4f28-90AE-42D789B004A8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exeC:\Windows\{B61F06C4-3981-4f11-B5C9-D50EB38EB4A8}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exeC:\Windows\{9AFE07C0-1949-4d4f-BAFF-006AD591AB6E}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exeC:\Windows\{211BF42F-DE85-4cc8-9BCE-8844DF404CD0}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exeC:\Windows\{8D18CF61-3EEF-453a-A4FF-6266E0BECBC2}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exeC:\Windows\{FF0B5FAC-E8A9-4d13-9F16-4BABBDD99CAD}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exeC:\Windows\{1B417B5D-BEF6-49e6-AC9F-DE401D0B5FB3}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FF0B5~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D18C~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{211BF~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9AFE0~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B61F0~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{609D5~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B8D4~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3AB7F~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D37A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{712CD~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35FAD~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a3315d1d465f294a131834717ae2f059
SHA1465066716f7e47c6099f7cd3edbcedd538874bf1
SHA256b76654666de3b4eed7494e0befaa13152ad13c5d15e00f04c32511d3b4afd25c
SHA512f2aa7be8eb7a1fdd9499d83a18800836779c70625c91badfdbf2f8d51725c8b4c86da9979dcfdc80e21a992a585b76dbd8eb50184d788130135a65bd9fac652d
-
Filesize
408KB
MD584d320bf3b5a660febc1019a6f0c4b44
SHA1df7c943cd16c46cad4a58ecb7d3ce6400e0a1463
SHA256ad39a95574f2dec980105041c97b9ed7b8f44592e7d874a08f9b63a754a0a045
SHA512e4b218b1760496767c439b28ee405d34d3c8aa73a6c9cf7257371e1cc3b2919007a19f6ded39ff1a15e0df3454610e0dd3bbc3e1ad9e76cd3de3ba1e8945375a
-
Filesize
408KB
MD5c04f79d29f181beaff8de7af354c7154
SHA19403d0f5be7207e6cbc5133da11b2e022980d656
SHA256a0d485073cc55f100cab7072630261141c2bd9f5310fac572322f95cb959d27c
SHA512b2f9ca7e40149a1e54f5ae25b64ee3f388ee81a8f628e11a3f946e1b2fc33c66ebf232cced37f2c7a70c84f95837673c6ad7a10a5aea64961824d2d0b23d819d
-
Filesize
408KB
MD52e1d8abef68c32042678a46cde48565b
SHA157a917e85ce406de16cde20ece80bb2bc2072e0c
SHA256d51db292ad51b969929d9dc310887e558e4fcf4a630f490d8fe75a0eb995b930
SHA512a21b7f7d00a7718ae748f432a45fd06e359273837779ff1e919989b37b5f1fdbb96b8f2b011efeb62049b8faaee38b730f9e99a8444fd6383abd5bfe5a846c99
-
Filesize
408KB
MD56785d1be379a5a04647456842fee2153
SHA1d072e90fdc822ce2e71139c1c23f009e77f02524
SHA25626f7eb65a776b95440579d5c895d63e59468ce9b6d711d8d4628cec33fb5401d
SHA5124caed652f67e0b918252329e9c0bb7e7d3a05b380e277097dbd2aa602741a0dc0f828d472d89d5e04f2a00badc32c6124a233ff5c365805ddce27fcd2c9bc981
-
Filesize
408KB
MD505b38f878ec07d57a40e572a260076b8
SHA121b61eecb077b455faea6b124adf79fe6d0e9b7b
SHA2568eca7f696ea0d4103c14bb3649fb41db928b5f477dd49c77885de3c7e14f6e4e
SHA512d453228b9540c6e1c5f91f7d29cae268884686c399f415b44a705bdaff2aa41dd4b7854420d769f8206a9e9495cfa1f209b0a814238a56ff1e96ba8c52176280
-
Filesize
408KB
MD592f5b4dc8b77c4729167c06073784050
SHA109cb19dd95879f36bf061e9b04395b5c0c1408c7
SHA256951337fc7c7c5966d3752c7acc4dcc31562f2a4ff42a0a06c5a4a0d02351e3ba
SHA512371653400f8bd4f1ba04fcb276411be5b566d1219613404742004e04beaa0797a2576b3221ba8d03acb163daf5a7d82a9ffab31cb68c3d2a43d8161a39d93d29
-
Filesize
408KB
MD5570924292486825893143f3a11b5f7e8
SHA116ee32bc151a429ac99a2668659d18a9c61a37b9
SHA256945e8ae3f5aea2f274cd2c08896badad29bb755e49efef0b732a3c1122c9454f
SHA512880fce0235099e36bb5ed2e75d12bf257e8a4017ad62fd32f681824dc7467e135713d435179de5be6f1cf5894e3036379865c455931ec5e6aa87ba8bd8e42fc2
-
Filesize
408KB
MD54a0d1a2d7d810f25ed3d656ac7356adc
SHA1d0dd7cc01065a7bfbee681e16b46e37dfc779e7a
SHA256a5a448d257b61eddb852bd3a70e5f31a99f90aacd2188703fc0ecda33d5b7f7e
SHA512871353bb0fc9f1f80d964abae88a169eb93a025ba08404d9111b6155f87a192aaf95ffc4e4f72c167987632a9237b81be5e87d9b2f64a0e84f064190c4ef6158
-
Filesize
408KB
MD581c50cdf6e85469021f632926bec4bb2
SHA1a3349fc6d81da5435e19a70737aa98a2b169d040
SHA256cf94cd227c804088cb079799f6c75b452bc2adf718e3f140f9f152380f338045
SHA51202479414691bba597c5ed70e7aef113860dac1df15a0b3404bc38353bf295d87213800aedf9246c72c86a095d6cbe821e739df1b0904e676f929cecd7b34c9ee
-
Filesize
408KB
MD56a68345c5cc67b7133727fb9abc49489
SHA1ec2d06ba8077a8c6641ea235321e9f7c9944fc99
SHA2568f08b6bccc2a2a06f481b6aa7fa75d3bb4061d6c5a7253c3ae61c8b92a9e2ce6
SHA512d1f9478d393761e8083d51d93970167265866cd5cbc06acbdbe795f802599f8d56674279091bcea223afa100a3763a77b5a2ebe14741589755806b6dd5bcbc89
-
Filesize
408KB
MD5364c2eae499c3aed1850c88568aa646f
SHA133345594996ab4c15c43a93a6c134acb683947e1
SHA2566d690dfa3cff5b5570e1b90b2386c19cd16d09749a6e9c855b9e42f90d58ddc7
SHA512d0c9f66092079fa2f9065daa279efd8932a77b0ed0042d30e557c9c79d00216c82378ecc420af37013f39b892cc6b8cdc683754ed0784fde959a12995bc5b08a