Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe
-
Size
372KB
-
MD5
3d1951415d226a6b43a7a34999ea4639
-
SHA1
4d1139c421c7b198bd923d291bab0b046e13f2f1
-
SHA256
4dd97b0935c45d0b353e5d6da3e684d26a2740fef94fcd2e645ff39d2f332794
-
SHA512
4249c121da5361a3a8f91b09d0ba8f76c11f17c87401d2dfb7fcd708ce61582d6c342fc03a4cf42756179e3b7cd67b0a2349cf55bb958bafeb3844a106f66684
-
SSDEEP
3072:CEGh0o+mlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEG1l/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70} {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1CD251F-4CA9-4a03-9E16-C378284937C0} {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{97D7A899-DBA2-4720-A279-FFF4A591C316}\stubpath = "C:\\Windows\\{97D7A899-DBA2-4720-A279-FFF4A591C316}.exe" {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE} 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F005B440-014F-4739-8888-6054901CDD65} {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56182924-9A11-4532-96D0-2D6C4322893D} {F005B440-014F-4739-8888-6054901CDD65}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56182924-9A11-4532-96D0-2D6C4322893D}\stubpath = "C:\\Windows\\{56182924-9A11-4532-96D0-2D6C4322893D}.exe" {F005B440-014F-4739-8888-6054901CDD65}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA}\stubpath = "C:\\Windows\\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe" {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25} {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{97D7A899-DBA2-4720-A279-FFF4A591C316} {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE}\stubpath = "C:\\Windows\\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe" 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11B6E313-52F7-420b-91E3-E7D9319BA557}\stubpath = "C:\\Windows\\{11B6E313-52F7-420b-91E3-E7D9319BA557}.exe" {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F005B440-014F-4739-8888-6054901CDD65}\stubpath = "C:\\Windows\\{F005B440-014F-4739-8888-6054901CDD65}.exe" {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CA8026-A620-4578-A932-ACC6DE56474A} {1B558563-5482-4e76-8A82-5BB2EF774930}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{11B6E313-52F7-420b-91E3-E7D9319BA557} {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B558563-5482-4e76-8A82-5BB2EF774930}\stubpath = "C:\\Windows\\{1B558563-5482-4e76-8A82-5BB2EF774930}.exe" {56182924-9A11-4532-96D0-2D6C4322893D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CA8026-A620-4578-A932-ACC6DE56474A}\stubpath = "C:\\Windows\\{D3CA8026-A620-4578-A932-ACC6DE56474A}.exe" {1B558563-5482-4e76-8A82-5BB2EF774930}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}\stubpath = "C:\\Windows\\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exe" {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25}\stubpath = "C:\\Windows\\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe" {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056} {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B558563-5482-4e76-8A82-5BB2EF774930} {56182924-9A11-4532-96D0-2D6C4322893D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA} {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}\stubpath = "C:\\Windows\\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe" {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1CD251F-4CA9-4a03-9E16-C378284937C0}\stubpath = "C:\\Windows\\{F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe" {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe -
Executes dropped EXE 12 IoCs
pid Process 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe 2780 {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe 2228 {C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe File created C:\Windows\{11B6E313-52F7-420b-91E3-E7D9319BA557}.exe {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe File created C:\Windows\{56182924-9A11-4532-96D0-2D6C4322893D}.exe {F005B440-014F-4739-8888-6054901CDD65}.exe File created C:\Windows\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe File created C:\Windows\{F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe File created C:\Windows\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exe {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe File created C:\Windows\{F005B440-014F-4739-8888-6054901CDD65}.exe {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe File created C:\Windows\{1B558563-5482-4e76-8A82-5BB2EF774930}.exe {56182924-9A11-4532-96D0-2D6C4322893D}.exe File created C:\Windows\{D3CA8026-A620-4578-A932-ACC6DE56474A}.exe {1B558563-5482-4e76-8A82-5BB2EF774930}.exe File created C:\Windows\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe File created C:\Windows\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe File created C:\Windows\{97D7A899-DBA2-4720-A279-FFF4A591C316}.exe {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F005B440-014F-4739-8888-6054901CDD65}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56182924-9A11-4532-96D0-2D6C4322893D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1B558563-5482-4e76-8A82-5BB2EF774930}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe Token: SeIncBasePriorityPrivilege 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe Token: SeIncBasePriorityPrivilege 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe Token: SeIncBasePriorityPrivilege 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe Token: SeIncBasePriorityPrivilege 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe Token: SeIncBasePriorityPrivilege 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe Token: SeIncBasePriorityPrivilege 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe Token: SeIncBasePriorityPrivilege 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe Token: SeIncBasePriorityPrivilege 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe Token: SeIncBasePriorityPrivilege 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe Token: SeIncBasePriorityPrivilege 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe Token: SeIncBasePriorityPrivilege 2780 {97D7A899-DBA2-4720-A279-FFF4A591C316}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3672 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 86 PID 4052 wrote to memory of 3672 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 86 PID 4052 wrote to memory of 3672 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 86 PID 4052 wrote to memory of 2072 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 87 PID 4052 wrote to memory of 2072 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 87 PID 4052 wrote to memory of 2072 4052 2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe 87 PID 3672 wrote to memory of 3496 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 88 PID 3672 wrote to memory of 3496 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 88 PID 3672 wrote to memory of 3496 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 88 PID 3672 wrote to memory of 3120 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 89 PID 3672 wrote to memory of 3120 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 89 PID 3672 wrote to memory of 3120 3672 {AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe 89 PID 3496 wrote to memory of 4576 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 95 PID 3496 wrote to memory of 4576 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 95 PID 3496 wrote to memory of 4576 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 95 PID 3496 wrote to memory of 1164 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 96 PID 3496 wrote to memory of 1164 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 96 PID 3496 wrote to memory of 1164 3496 {11B6E313-52F7-420b-91E3-E7D9319BA557}.exe 96 PID 4576 wrote to memory of 3720 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 97 PID 4576 wrote to memory of 3720 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 97 PID 4576 wrote to memory of 3720 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 97 PID 4576 wrote to memory of 564 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 98 PID 4576 wrote to memory of 564 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 98 PID 4576 wrote to memory of 564 4576 {F005B440-014F-4739-8888-6054901CDD65}.exe 98 PID 3720 wrote to memory of 548 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 99 PID 3720 wrote to memory of 548 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 99 PID 3720 wrote to memory of 548 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 99 PID 3720 wrote to memory of 1524 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 100 PID 3720 wrote to memory of 1524 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 100 PID 3720 wrote to memory of 1524 3720 {56182924-9A11-4532-96D0-2D6C4322893D}.exe 100 PID 548 wrote to memory of 3208 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 101 PID 548 wrote to memory of 3208 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 101 PID 548 wrote to memory of 3208 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 101 PID 548 wrote to memory of 1288 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 102 PID 548 wrote to memory of 1288 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 102 PID 548 wrote to memory of 1288 548 {1B558563-5482-4e76-8A82-5BB2EF774930}.exe 102 PID 3208 wrote to memory of 2884 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 103 PID 3208 wrote to memory of 2884 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 103 PID 3208 wrote to memory of 2884 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 103 PID 3208 wrote to memory of 3160 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 104 PID 3208 wrote to memory of 3160 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 104 PID 3208 wrote to memory of 3160 3208 {D3CA8026-A620-4578-A932-ACC6DE56474A}.exe 104 PID 2884 wrote to memory of 3748 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 105 PID 2884 wrote to memory of 3748 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 105 PID 2884 wrote to memory of 3748 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 105 PID 2884 wrote to memory of 3064 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 106 PID 2884 wrote to memory of 3064 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 106 PID 2884 wrote to memory of 3064 2884 {EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe 106 PID 3748 wrote to memory of 4912 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 107 PID 3748 wrote to memory of 4912 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 107 PID 3748 wrote to memory of 4912 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 107 PID 3748 wrote to memory of 4732 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 108 PID 3748 wrote to memory of 4732 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 108 PID 3748 wrote to memory of 4732 3748 {492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe 108 PID 4912 wrote to memory of 4744 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 109 PID 4912 wrote to memory of 4744 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 109 PID 4912 wrote to memory of 4744 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 109 PID 4912 wrote to memory of 988 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 110 PID 4912 wrote to memory of 988 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 110 PID 4912 wrote to memory of 988 4912 {F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe 110 PID 4744 wrote to memory of 2780 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe 111 PID 4744 wrote to memory of 2780 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe 111 PID 4744 wrote to memory of 2780 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe 111 PID 4744 wrote to memory of 3080 4744 {1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_3d1951415d226a6b43a7a34999ea4639_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exeC:\Windows\{AE8B317D-A841-412b-B6D7-CB4403FCB9FE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\{11B6E313-52F7-420b-91E3-E7D9319BA557}.exeC:\Windows\{11B6E313-52F7-420b-91E3-E7D9319BA557}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\{F005B440-014F-4739-8888-6054901CDD65}.exeC:\Windows\{F005B440-014F-4739-8888-6054901CDD65}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\{56182924-9A11-4532-96D0-2D6C4322893D}.exeC:\Windows\{56182924-9A11-4532-96D0-2D6C4322893D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\{1B558563-5482-4e76-8A82-5BB2EF774930}.exeC:\Windows\{1B558563-5482-4e76-8A82-5BB2EF774930}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\{D3CA8026-A620-4578-A932-ACC6DE56474A}.exeC:\Windows\{D3CA8026-A620-4578-A932-ACC6DE56474A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exeC:\Windows\{EDE1202C-8562-4a7b-AD83-C249F75FB2FA}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exeC:\Windows\{492D7BD8-D23C-4eb5-BBAD-44EC6C578E70}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\{F1CD251F-4CA9-4a03-9E16-C378284937C0}.exeC:\Windows\{F1CD251F-4CA9-4a03-9E16-C378284937C0}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exeC:\Windows\{1D6B9469-AA30-42d9-AB6A-D76C1E211D25}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\{97D7A899-DBA2-4720-A279-FFF4A591C316}.exeC:\Windows\{97D7A899-DBA2-4720-A279-FFF4A591C316}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exeC:\Windows\{C6B3675E-E91B-4dfa-98D0-F4B9D46DB056}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{97D7A~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1D6B9~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F1CD2~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{492D7~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EDE12~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D3CA8~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1B558~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56182~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F005B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11B6E~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AE8B3~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5d489a538f7320930835a2d984e147ab1
SHA12ad66fb10bc963514df409e9ebaaf932d3ce316e
SHA2560cad65799952b835c2e4791f99f9fd8608ae46a4716a079022bd3f0ff86a165c
SHA512c6523c5b359c3bb49227828beae994f8d561365017cbc8949957939ab731fb149c700cbf89946ddb539ff1de6dee4c97ce127ce10a2b938768785d81bb4e4121
-
Filesize
372KB
MD52fd55b7229a6a1363ea8907713cfde7e
SHA17c8ab0b2fe4a449aa0119bc2064bafea2f13dbdc
SHA256faef394faae89ef84715848c463661b055352669d024b4c1d71f8fdafdaa8137
SHA512711f6dc9d2acd77185c27b7e876d098f028316916eb7c8763d40134db36ea975b0978b0fea774cbdb5070e1fe9b775932c4ba0395c7b98933be06fd62fe45dc7
-
Filesize
372KB
MD5cd2037ca82a71c336a7e72c68799936e
SHA15777e6048037e651ae7e387df406634d6e84b81b
SHA256817bc5dd6506e39c7c3762f1dd328e104ac721b353cd4d4d96f0b40e370026ff
SHA512a8467fcbbdd0f771c80811702424bd677f18fcf82931f3b3c9d3df74f2386e37f19a2e2b6da17ffab59217d7c1a1ac101fff7c3e2fe8815f96028f4cd8bd9822
-
Filesize
372KB
MD5fd21846afa850f926089cb9279954fc6
SHA194872971b81d22479e0dbce41293434a4e52fb09
SHA256556754ae8e22ec47d0ef78541013e8be7d600094a3fc6258043661b5a4c714e1
SHA512b852641bc7670002e6efa8faac7f03e77ed8600a80882b3d44fc3e3df6a4c1b863780977561a40162cdcba14091a3446de444b1c6cf9c98fd1dbc38335467f7c
-
Filesize
372KB
MD5c6cf02ab7b74a26ca5f2b8a2c3ab1177
SHA1ed14a1d36a3ff06f33f54ff012fef67350a07202
SHA25622210954c152908669b2955b13df28850ac59a6e06ba7745034acebb97535ab4
SHA5129991de00b67231cc03eb346029d42b3088364ff57e670b1ee2c8035c9523b410cc91482692044ef019f8d857485893036c9817977fd5bf0cd70563fea5542cba
-
Filesize
372KB
MD5d0ebe1705dbe1774f3471d6b2d607420
SHA14cb4168e56c1a2ef0a468a238f007698cde47a0d
SHA2568995fd43ff1687bf4eb7859ec96eb3f43b9ed9995a712e2006f378ab591c0ac4
SHA51285bb33b13d32d39ee2915cf0e087c958412cfdd56e5800c781acd121eaa391b7d7600f2bd75066e302184ed01ed8c421e1a1943c9cc04e468756af190422f4c9
-
Filesize
372KB
MD599f6f3657e4e5740f58343c9c7bb3f0c
SHA168b3d1f35276b8e2835fcccfb19de0d745d9ec35
SHA25672bd71c7587effe1778d736253068b029a396269de8bed8e5e7323d65cfff8df
SHA51211426025001dc18fad00601dd55df3922b5f36331f1914bd24025e1a0d053e6a11af1099a49b254936cb8171b7038529c7ce9d57385878fe7d9efb2d4b200e65
-
Filesize
372KB
MD5ae83675562b47522b07cb1ad94808449
SHA1192cfd36e1aab3ebf1f8307e0e347f4498565f21
SHA256edb19a1af6afa44ad707c59434a6f858883b2f3e7a1b915c2d2c3cc531d7dc0c
SHA51228e295aee5cb40c0635959b94c9e18077353a00230de83621ceace69c2dc3aff266abf615609ed16636c38a213b15557e8e19477dff25cf67757757ecde77004
-
Filesize
372KB
MD53441d0dafe179bfd05e9122efa24d7d9
SHA1280a8a76a16b5612b69d960ebd602abce0a2335e
SHA25604dd82917e0e5ec3d9b84a47b0fd03bf1e301526648e99306fb396bf77182fff
SHA5120454da90acd025a561ef815950ae8800710e0e454c3b2efce989cdae7a825ae523028e68d6a4888372efa7098dd31d7d5abb8f548207c4e0a9da545e50f55229
-
Filesize
372KB
MD51e28cf2dcbfd66b23c942857be829037
SHA1c1a76bf09d6160b676d4b9879b80f160aca7cd83
SHA256e430eb273123fb7b5c41da1fd3188c72862fbd8ad46f5bbfe78b3be4e51f6c6f
SHA512904fa91820b0dd562e2f5d3e4d734e84b83c73357119404655a6f5992c036094cdc7672db59ab2f344765bbb3c1583bdc3262d84fe46920c37a885d4e9cbf15a
-
Filesize
372KB
MD57bff9ed5ac68376b8e53557774840f48
SHA1aca4933688a36b664137b29362d53ea999710329
SHA25685d191f1b257ba92212516c3de6b64a79b0de9e6f317b7b2bbd617d3bbb23185
SHA512b9f83e9b5c8a35cd77af674c70849cb23cfb015839163e4b799c8525b3f4315a6b7c71b0d5955fca397a1414f43652268f224b752c1c14634c38ce26588b92d7
-
Filesize
372KB
MD546acddb73d8198e2cac41f5d233b0c40
SHA1b31c9712f2c30164dc04e1c722d70efa326dedd3
SHA256e9dfc735a33cc30da68e99fd37daf0a31fbae2b26ad4dd5437a60ca76b0ba7f0
SHA51299b31a77e15b2f9152a91627420918f540f881bcb76b1aeeacaac378e4b07137c74ce8b67a4139530dfed26d377eb1d404d5295022aa0a8d024c49c91a48c50a