Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe
-
Size
180KB
-
MD5
cacfd063d386abc10d049f18c8a1a59b
-
SHA1
ab7984ae095a22cf2fcfcbce3f67a55407fbaee6
-
SHA256
6a06e947380a9fc3df7822b5a76e344e4d725deff627900cf15a9323c29f9e22
-
SHA512
a8ee3f99cbab1d4d7b5c0b019925fc1715f0c0a9413f6c325cbc0d18b56f2c01f5d50ee132998a9e286a68d72c64ad2394f677b3e56eeed0d12c210b3934f7e5
-
SSDEEP
3072:jEGh0ojlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG9l5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B638CF63-5C20-44f8-AE78-8E4648626754} 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B638CF63-5C20-44f8-AE78-8E4648626754}\stubpath = "C:\\Windows\\{B638CF63-5C20-44f8-AE78-8E4648626754}.exe" 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA} {B638CF63-5C20-44f8-AE78-8E4648626754}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}\stubpath = "C:\\Windows\\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe" {B638CF63-5C20-44f8-AE78-8E4648626754}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5} {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98989FE4-390F-4482-A63A-D6A81A509BDD}\stubpath = "C:\\Windows\\{98989FE4-390F-4482-A63A-D6A81A509BDD}.exe" {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92160BEE-A85D-4fe0-B938-DF99273D8668}\stubpath = "C:\\Windows\\{92160BEE-A85D-4fe0-B938-DF99273D8668}.exe" {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830B6D77-565B-4b39-952C-F998D980F797}\stubpath = "C:\\Windows\\{830B6D77-565B-4b39-952C-F998D980F797}.exe" {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DE9B199-A185-46dc-BC27-30658A417DBC} {830B6D77-565B-4b39-952C-F998D980F797}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1DE9B199-A185-46dc-BC27-30658A417DBC}\stubpath = "C:\\Windows\\{1DE9B199-A185-46dc-BC27-30658A417DBC}.exe" {830B6D77-565B-4b39-952C-F998D980F797}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3794AA77-7E54-450f-B61A-973204877DE0} {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3794AA77-7E54-450f-B61A-973204877DE0}\stubpath = "C:\\Windows\\{3794AA77-7E54-450f-B61A-973204877DE0}.exe" {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{92160BEE-A85D-4fe0-B938-DF99273D8668} {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}\stubpath = "C:\\Windows\\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe" {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{830B6D77-565B-4b39-952C-F998D980F797} {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91AFC63A-0CCE-405a-9444-359CC1EB23DC} {3794AA77-7E54-450f-B61A-973204877DE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98989FE4-390F-4482-A63A-D6A81A509BDD} {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8} {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}\stubpath = "C:\\Windows\\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe" {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{91AFC63A-0CCE-405a-9444-359CC1EB23DC}\stubpath = "C:\\Windows\\{91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe" {3794AA77-7E54-450f-B61A-973204877DE0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29} {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29}\stubpath = "C:\\Windows\\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exe" {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe -
Deletes itself 1 IoCs
pid Process 1928 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 2700 {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe 1964 {3794AA77-7E54-450f-B61A-973204877DE0}.exe 1728 {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe 2272 {0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B638CF63-5C20-44f8-AE78-8E4648626754}.exe 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe File created C:\Windows\{92160BEE-A85D-4fe0-B938-DF99273D8668}.exe {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe File created C:\Windows\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe File created C:\Windows\{91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe {3794AA77-7E54-450f-B61A-973204877DE0}.exe File created C:\Windows\{1DE9B199-A185-46dc-BC27-30658A417DBC}.exe {830B6D77-565B-4b39-952C-F998D980F797}.exe File created C:\Windows\{3794AA77-7E54-450f-B61A-973204877DE0}.exe {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe File created C:\Windows\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exe {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe File created C:\Windows\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe {B638CF63-5C20-44f8-AE78-8E4648626754}.exe File created C:\Windows\{98989FE4-390F-4482-A63A-D6A81A509BDD}.exe {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe File created C:\Windows\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe File created C:\Windows\{830B6D77-565B-4b39-952C-F998D980F797}.exe {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {830B6D77-565B-4b39-952C-F998D980F797}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3794AA77-7E54-450f-B61A-973204877DE0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B638CF63-5C20-44f8-AE78-8E4648626754}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe Token: SeIncBasePriorityPrivilege 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe Token: SeIncBasePriorityPrivilege 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe Token: SeIncBasePriorityPrivilege 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe Token: SeIncBasePriorityPrivilege 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe Token: SeIncBasePriorityPrivilege 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe Token: SeIncBasePriorityPrivilege 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe Token: SeIncBasePriorityPrivilege 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe Token: SeIncBasePriorityPrivilege 2700 {1DE9B199-A185-46dc-BC27-30658A417DBC}.exe Token: SeIncBasePriorityPrivilege 1964 {3794AA77-7E54-450f-B61A-973204877DE0}.exe Token: SeIncBasePriorityPrivilege 1728 {91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2884 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 31 PID 1972 wrote to memory of 2884 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 31 PID 1972 wrote to memory of 2884 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 31 PID 1972 wrote to memory of 2884 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 31 PID 1972 wrote to memory of 1928 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 32 PID 1972 wrote to memory of 1928 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 32 PID 1972 wrote to memory of 1928 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 32 PID 1972 wrote to memory of 1928 1972 2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe 32 PID 2884 wrote to memory of 2868 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 33 PID 2884 wrote to memory of 2868 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 33 PID 2884 wrote to memory of 2868 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 33 PID 2884 wrote to memory of 2868 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 33 PID 2884 wrote to memory of 2728 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 34 PID 2884 wrote to memory of 2728 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 34 PID 2884 wrote to memory of 2728 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 34 PID 2884 wrote to memory of 2728 2884 {B638CF63-5C20-44f8-AE78-8E4648626754}.exe 34 PID 2868 wrote to memory of 2852 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 35 PID 2868 wrote to memory of 2852 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 35 PID 2868 wrote to memory of 2852 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 35 PID 2868 wrote to memory of 2852 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 35 PID 2868 wrote to memory of 2628 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 36 PID 2868 wrote to memory of 2628 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 36 PID 2868 wrote to memory of 2628 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 36 PID 2868 wrote to memory of 2628 2868 {B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe 36 PID 2852 wrote to memory of 2616 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 37 PID 2852 wrote to memory of 2616 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 37 PID 2852 wrote to memory of 2616 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 37 PID 2852 wrote to memory of 2616 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 37 PID 2852 wrote to memory of 2668 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 38 PID 2852 wrote to memory of 2668 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 38 PID 2852 wrote to memory of 2668 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 38 PID 2852 wrote to memory of 2668 2852 {98989FE4-390F-4482-A63A-D6A81A509BDD}.exe 38 PID 2616 wrote to memory of 3052 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 39 PID 2616 wrote to memory of 3052 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 39 PID 2616 wrote to memory of 3052 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 39 PID 2616 wrote to memory of 3052 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 39 PID 2616 wrote to memory of 496 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 40 PID 2616 wrote to memory of 496 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 40 PID 2616 wrote to memory of 496 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 40 PID 2616 wrote to memory of 496 2616 {92160BEE-A85D-4fe0-B938-DF99273D8668}.exe 40 PID 3052 wrote to memory of 1064 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 41 PID 3052 wrote to memory of 1064 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 41 PID 3052 wrote to memory of 1064 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 41 PID 3052 wrote to memory of 1064 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 41 PID 3052 wrote to memory of 1236 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 42 PID 3052 wrote to memory of 1236 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 42 PID 3052 wrote to memory of 1236 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 42 PID 3052 wrote to memory of 1236 3052 {503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe 42 PID 1064 wrote to memory of 1412 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 43 PID 1064 wrote to memory of 1412 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 43 PID 1064 wrote to memory of 1412 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 43 PID 1064 wrote to memory of 1412 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 43 PID 1064 wrote to memory of 1724 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 44 PID 1064 wrote to memory of 1724 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 44 PID 1064 wrote to memory of 1724 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 44 PID 1064 wrote to memory of 1724 1064 {DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe 44 PID 1412 wrote to memory of 2700 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 45 PID 1412 wrote to memory of 2700 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 45 PID 1412 wrote to memory of 2700 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 45 PID 1412 wrote to memory of 2700 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 45 PID 1412 wrote to memory of 2152 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 46 PID 1412 wrote to memory of 2152 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 46 PID 1412 wrote to memory of 2152 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 46 PID 1412 wrote to memory of 2152 1412 {830B6D77-565B-4b39-952C-F998D980F797}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-09_cacfd063d386abc10d049f18c8a1a59b_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\{B638CF63-5C20-44f8-AE78-8E4648626754}.exeC:\Windows\{B638CF63-5C20-44f8-AE78-8E4648626754}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exeC:\Windows\{B6FF883A-89B3-45fb-AADD-6DB53AFAFEAA}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{98989FE4-390F-4482-A63A-D6A81A509BDD}.exeC:\Windows\{98989FE4-390F-4482-A63A-D6A81A509BDD}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\{92160BEE-A85D-4fe0-B938-DF99273D8668}.exeC:\Windows\{92160BEE-A85D-4fe0-B938-DF99273D8668}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exeC:\Windows\{503C6AF0-EC99-413e-AF02-19D4A6ADE4B5}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exeC:\Windows\{DDFEF87D-A3D8-45d9-9A21-7700954F3EF8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\{830B6D77-565B-4b39-952C-F998D980F797}.exeC:\Windows\{830B6D77-565B-4b39-952C-F998D980F797}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\{1DE9B199-A185-46dc-BC27-30658A417DBC}.exeC:\Windows\{1DE9B199-A185-46dc-BC27-30658A417DBC}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\{3794AA77-7E54-450f-B61A-973204877DE0}.exeC:\Windows\{3794AA77-7E54-450f-B61A-973204877DE0}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\{91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exeC:\Windows\{91AFC63A-0CCE-405a-9444-359CC1EB23DC}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Windows\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exeC:\Windows\{0B4F2B3B-3DFB-48c3-8BE7-270267577F29}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{91AFC~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3794A~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1DE9B~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{830B6~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DDFEF~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{503C6~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{92160~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{98989~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6FF8~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B638C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD525473e78d00983775f8c20b5fdc5f980
SHA1660238f90b1482aac9fda03b073efcda7209ef79
SHA25694a9b8a91b382458f00e7b7cb15dca2513a27282db15330f778c053d78b64fe8
SHA512a66a9e9ccdfe9eb4fc48dc042cfc1de3dbf555f697f07926b4079c897901feacdb497ffca8e757fb1e9b0ba4ba225d36eb8a7a06936c35cb413042db57dc8724
-
Filesize
180KB
MD5127b86e004809c5a01abe0d904af2e36
SHA198444c684f1788eae8a6e3917e803030888a47f3
SHA256ee7592ed8b3988c4371cb9fcffaa1078669ab991a0d2289eccfd4121031aa3a3
SHA512f56507abb421a3e943b21e8cf8f909bf3c8117d2941ba718d4b78128c9e200a8af835af75f5b8e3f154b531338c34053066b1f15e5705156b2182db5e9df5648
-
Filesize
180KB
MD554a08e8c9123d1f52d56e9d8c17d9396
SHA13c8b2bc33d5093e504aba079dea017c45eb55ed7
SHA25691980704fc2dc3e4145f2d376d2895b5cf023d503a562d11673487bad6f6d033
SHA5124dfb1851fdd61305400c0adf54b3b8631d5e25b6181a89af11965d59ed8d3eb01dedc6cd12e926eda1862bb1d297842bd960283879992fff090d39f4550f5e3b
-
Filesize
180KB
MD50a0eaed7a30c9042753978cb7ea64190
SHA108f9f04fe0742d4508e891758c35e9b925ac20be
SHA25603ac68d41a59ab604277b9e03447193ec0df30f89a883316c6e171df5197dd6a
SHA512bc7543aac4e8580ea5c5104ec05e3fa5f983d4837e6e27745e41ed95efe45f1c4db1894b5b20f7931985a07a727d95b940d898b4183c7a7167f20b257bdde6b3
-
Filesize
180KB
MD5486b3cdaa762fc2beccb09fbfbb5c311
SHA1e3fc656b6fb29b85a82dc21bd01e87bb21581a11
SHA25619ef11a2fb4b853017d76ba94729c439ecf193c1a5674fbc76a9814747721ed1
SHA512e6e89be5bc26f44fd87540298759ed0aa69a06c6e4c92be0e304f6f0d59859b3afe078b612031426b788631d2fdb3b215837387e01dda775700189a1ca59c742
-
Filesize
180KB
MD5b8d4e8128826cf3da49f74ac246857c4
SHA199f5702d545c48ec40fcc41c56f43b8ec8da1d1b
SHA256e9ad0f29055145b1eba22a1f76da07744accaafad5bef5dbf750ca89fde2a55c
SHA512a32c024bf9e2f91eed370e0b93e717c662ec5f8a7a9474f22a9471f530c6110081a5a2e1fb3f7ca92cc7be67b0d3711246ff0d8c9446df64e9e89496d043a4a3
-
Filesize
180KB
MD57358afd1d137a7989cb5255b97fb943d
SHA1c2881664ec1ea5da26c8305f9b4437977fb1a51a
SHA256cd5bce2a69597f97ec31a39f65254e25d30a44991240ea6436d67a46d02d8dea
SHA512a461e75dd6d9789197ab14372ff817263a6365674dc0fcc64e6008c50f102f72a51f35da00af38f2db2ef9f45728c16fe687b4c6aeb91024894d52fdb5e569c9
-
Filesize
180KB
MD527fad422b6c0f7495ce0563b53ced62c
SHA1ae294cabe94503a94a229f30fcd42d8e5a8897bc
SHA2565aa76da701e3db0bef58e4305e767971625bba31175c12fa07d5c3f7d1f1df83
SHA512e8d64e5d86c02c80db2f1981ecdd42b270a52848e2bb77af31b2c8db5c6a6bb3b85c6a88b0b8eaf1b91c3aab238a7bf7583210fc6bf2be8859cb01dbcf6a6ab4
-
Filesize
180KB
MD53983f5611d7a605308c5281b1b47706a
SHA18b4fbeb30fae81a2ca36224105c86eea2bc6616b
SHA256e8073cd3615c7ca73e484fcdc7a4643a44f2b699574922e51c125d4ce5c77aba
SHA512d578e7af59518ead47306bd7f152c28cb5b438984f5cc090190195d2a0e5bc91b106b93f34e24ef9f5739ece0f51eacd1d02b6aed42f7caa75f29202fcc222e4
-
Filesize
180KB
MD58c784ad8ffca0408557eb4fcde10a2a5
SHA1ffe47129f26a4f11987215f8a6fd27d35b3565cc
SHA2564eb577dc70214dd884d30772092f95e3faa85c7821d4c90c5080d9d6cec19b7d
SHA512caa0d7633febbdd001ca2b2ee22ce396960920dd83212b36d172113be8f7f1d5589aa7d608702b51ae45d749d00c2e2fe631fee510b2ef202445715d71e7213a
-
Filesize
180KB
MD5b0436ba764f9ab66c785f517c396e083
SHA13267d5b8e671193e5832255d2575f2109c034e7b
SHA256de9993013481a5cfac5545cb1d2cc263249923c1bb93cfba8d69186d242ecdd2
SHA512711e98c8e0059af49201428542b78a9cfd0f0b97234827c0c390765b770cca12d536235885e2f2a4f6a5457166691d6683a87dfad9abb7015b12ad3281e7cd88