Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe
-
Size
168KB
-
MD5
03a0ec4e9d736a377870b1600d5e71b6
-
SHA1
5fe1ae9c8987468ee3d0a59aa722ba0ba64c6687
-
SHA256
58f5af79b6f1c514db5b05d25b75d620b27fa544eb281b1f957a9f131d1c39d2
-
SHA512
3e3558836b18fedb1d107a08aebdaf29e9aaae4fa4944449f02130b9ad75f705a7a9bdad6e38d7411b6b340c4438c068752145bf227b5b8e6222827afa66dc4e
-
SSDEEP
1536:1EGh0oKlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oKlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{963ACB5E-902D-42a3-85EC-A239EEC500F4} 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3} {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524} {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{963ACB5E-902D-42a3-85EC-A239EEC500F4}\stubpath = "C:\\Windows\\{963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe" 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9716BA52-BABF-47f3-8DE4-4297F468BA18} {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C792307A-BDEB-4fc5-9311-4F3B90F6D313}\stubpath = "C:\\Windows\\{C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe" {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F} {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}\stubpath = "C:\\Windows\\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe" {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C218DFF8-8C1B-4841-8717-E9543D33AA6A}\stubpath = "C:\\Windows\\{C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exe" {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEDBC219-51BB-4b51-9761-6C3593F47FC5} {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}\stubpath = "C:\\Windows\\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe" {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E} {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F} {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F}\stubpath = "C:\\Windows\\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe" {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70262C85-C0F4-4c7d-97B3-7866A73325E6}\stubpath = "C:\\Windows\\{70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe" {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C218DFF8-8C1B-4841-8717-E9543D33AA6A} {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CEDBC219-51BB-4b51-9761-6C3593F47FC5}\stubpath = "C:\\Windows\\{CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe" {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9716BA52-BABF-47f3-8DE4-4297F468BA18}\stubpath = "C:\\Windows\\{9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe" {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C792307A-BDEB-4fc5-9311-4F3B90F6D313} {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}\stubpath = "C:\\Windows\\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe" {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524}\stubpath = "C:\\Windows\\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe" {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70262C85-C0F4-4c7d-97B3-7866A73325E6} {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe -
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 1632 {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe 2220 {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe 3012 {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe 1924 {C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe File created C:\Windows\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe File created C:\Windows\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe File created C:\Windows\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe File created C:\Windows\{70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe File created C:\Windows\{CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe File created C:\Windows\{9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe File created C:\Windows\{C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe File created C:\Windows\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe File created C:\Windows\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe File created C:\Windows\{C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exe {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe Token: SeIncBasePriorityPrivilege 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe Token: SeIncBasePriorityPrivilege 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe Token: SeIncBasePriorityPrivilege 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe Token: SeIncBasePriorityPrivilege 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe Token: SeIncBasePriorityPrivilege 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe Token: SeIncBasePriorityPrivilege 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe Token: SeIncBasePriorityPrivilege 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe Token: SeIncBasePriorityPrivilege 1632 {BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe Token: SeIncBasePriorityPrivilege 2220 {0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe Token: SeIncBasePriorityPrivilege 3012 {70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2744 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 30 PID 3028 wrote to memory of 2744 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 30 PID 3028 wrote to memory of 2744 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 30 PID 3028 wrote to memory of 2744 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 30 PID 3028 wrote to memory of 2692 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 31 PID 3028 wrote to memory of 2692 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 31 PID 3028 wrote to memory of 2692 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 31 PID 3028 wrote to memory of 2692 3028 2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe 31 PID 2744 wrote to memory of 2784 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 32 PID 2744 wrote to memory of 2784 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 32 PID 2744 wrote to memory of 2784 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 32 PID 2744 wrote to memory of 2784 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 32 PID 2744 wrote to memory of 2560 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 33 PID 2744 wrote to memory of 2560 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 33 PID 2744 wrote to memory of 2560 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 33 PID 2744 wrote to memory of 2560 2744 {963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe 33 PID 2784 wrote to memory of 2548 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 34 PID 2784 wrote to memory of 2548 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 34 PID 2784 wrote to memory of 2548 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 34 PID 2784 wrote to memory of 2548 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 34 PID 2784 wrote to memory of 2588 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 35 PID 2784 wrote to memory of 2588 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 35 PID 2784 wrote to memory of 2588 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 35 PID 2784 wrote to memory of 2588 2784 {CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe 35 PID 2548 wrote to memory of 1760 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 36 PID 2548 wrote to memory of 1760 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 36 PID 2548 wrote to memory of 1760 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 36 PID 2548 wrote to memory of 1760 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 36 PID 2548 wrote to memory of 1560 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 37 PID 2548 wrote to memory of 1560 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 37 PID 2548 wrote to memory of 1560 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 37 PID 2548 wrote to memory of 1560 2548 {9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe 37 PID 1760 wrote to memory of 1104 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 38 PID 1760 wrote to memory of 1104 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 38 PID 1760 wrote to memory of 1104 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 38 PID 1760 wrote to memory of 1104 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 38 PID 1760 wrote to memory of 2096 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 39 PID 1760 wrote to memory of 2096 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 39 PID 1760 wrote to memory of 2096 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 39 PID 1760 wrote to memory of 2096 1760 {C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe 39 PID 1104 wrote to memory of 2256 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 41 PID 1104 wrote to memory of 2256 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 41 PID 1104 wrote to memory of 2256 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 41 PID 1104 wrote to memory of 2256 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 41 PID 1104 wrote to memory of 296 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 42 PID 1104 wrote to memory of 296 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 42 PID 1104 wrote to memory of 296 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 42 PID 1104 wrote to memory of 296 1104 {3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe 42 PID 2256 wrote to memory of 1332 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 43 PID 2256 wrote to memory of 1332 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 43 PID 2256 wrote to memory of 1332 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 43 PID 2256 wrote to memory of 1332 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 43 PID 2256 wrote to memory of 2060 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 44 PID 2256 wrote to memory of 2060 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 44 PID 2256 wrote to memory of 2060 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 44 PID 2256 wrote to memory of 2060 2256 {EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe 44 PID 1332 wrote to memory of 1632 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 45 PID 1332 wrote to memory of 1632 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 45 PID 1332 wrote to memory of 1632 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 45 PID 1332 wrote to memory of 1632 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 45 PID 1332 wrote to memory of 688 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 46 PID 1332 wrote to memory of 688 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 46 PID 1332 wrote to memory of 688 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 46 PID 1332 wrote to memory of 688 1332 {B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-10_03a0ec4e9d736a377870b1600d5e71b6_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\{963ACB5E-902D-42a3-85EC-A239EEC500F4}.exeC:\Windows\{963ACB5E-902D-42a3-85EC-A239EEC500F4}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\{CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exeC:\Windows\{CEDBC219-51BB-4b51-9761-6C3593F47FC5}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\{9716BA52-BABF-47f3-8DE4-4297F468BA18}.exeC:\Windows\{9716BA52-BABF-47f3-8DE4-4297F468BA18}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\{C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exeC:\Windows\{C792307A-BDEB-4fc5-9311-4F3B90F6D313}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exeC:\Windows\{3B5D2104-65A7-4b0d-B2F4-2808ACADC33F}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exeC:\Windows\{EA987CF6-1ABB-4ca2-B5C8-D609F0C342B3}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exeC:\Windows\{B7FFCF0A-CEA1-4980-82EB-F924BD891D4E}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exeC:\Windows\{BEBDBC70-ED34-4c17-855C-C48DEAAC9524}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exeC:\Windows\{0F8D1730-9E7A-482a-A2D6-E32B6146A19F}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\{70262C85-C0F4-4c7d-97B3-7866A73325E6}.exeC:\Windows\{70262C85-C0F4-4c7d-97B3-7866A73325E6}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\{C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exeC:\Windows\{C218DFF8-8C1B-4841-8717-E9543D33AA6A}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70262~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0F8D1~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEBDB~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B7FFC~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA987~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3B5D2~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C7923~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9716B~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CEDBC~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{963AC~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD558b95f8bcafcd989b71077c20bb23c1f
SHA1285e4299088f388b7e77c2449f5f07384b79288a
SHA2568073a8828fe55049eb51a3208aca148ae10d8556dcfdcf05500c5b78a6c8bb3f
SHA512daa862bb8f3a9e11681606e4f8c83361a5da2299de42d1c68d85b534d0bdf962781e10fd56afb3be72af0c6517196e5c22399a5bcd8af9740db923a69398a2fd
-
Filesize
168KB
MD5e456dc156ecf3ca0335f8fb55b43956d
SHA1a2f1359e74b465f9199876a5cbb25e1f226d6f1c
SHA256aa1e542103d61b46e71ec6e25bbde0f16a2824c9ca56a769c60181653feb17aa
SHA512a3316e6230a38f12df881f6e1136dce00f1e860abcdc83a8296df7b3b092ece4a5901b9927ad8c3276b3b7e23de6cd707e16c55e579877bad171b21bd374ba31
-
Filesize
168KB
MD570661cd091c0fc419c86f993a3c0c198
SHA1c7cf8656157c3eeec5f830f350a2574cbb463fe3
SHA25679b5771f95c803f7b4dd12b58b5109d64aab52e85740d917f1b55a5911846747
SHA5126b899354e00e58ae05c42b6f0443a805e036b5105abda448b62328a08bccb3d0e4d733afeb804975d49577d0be66af28509de82a66984e3211b4fce3e92ac048
-
Filesize
168KB
MD581ee23ad30d4b7209143e0744adb6c8d
SHA12a0b06a301272bf40a03e6a73b7f87353862c8a7
SHA2565cb69413fae57d1908d63e7016f3474fe18b020ff255822753b3ae04abe2a013
SHA5129449b5ad20815d8925676e2e073eb919596acfdcdef2b2e6c0e2c08fe74827e77f59eed03d34ff936a42a3c4684e2149770b1a4fc7bcd975e0e087520e097e10
-
Filesize
168KB
MD5b9a5dc30d77b0280324b7f24f603def8
SHA15b2a9ab568f5ecca2304f2fde64821187c801f0f
SHA2567a92f5b0348ace202d337bae4d1d4db3a47a4b1b1cfbec970f3efa9f6ef78742
SHA5125bc499b0f33e4300afe78e4bf237f4c8af6ed58289cd118431985a1cf01c7535b68481aa6c558f9756d670c52ec055fb69977fea6cd6a68c539ab130c131cd53
-
Filesize
168KB
MD57ca7ddae7f512938e375efa5ae730f6f
SHA13c65319486d52172659f642dd98545ef1f1590aa
SHA256e046a3485840052edd06cf7b5cd02e356a080ba31db236f0618222eeb4e486db
SHA512fde960b22c31dcc9c7374240eb3dbf451cf17fb5f9bc3fffc4d4d3be063749b2720eae1ed1f705a40201e4e5041dca79d95b1cace47c86b4e8171a6363badcc8
-
Filesize
168KB
MD50cceabc2994024881cfae663c3bc9daa
SHA1085cec5489076fc5f7e9ebcdb0296c582172a59e
SHA256a0ed654ec111a4916b9133d1441f0c81fd45be4f9634c953806634aa2aae9d87
SHA512f4ad77c6ab04059205d10add02d0f20d58c4ca4130c6ba65006ca9cfb8775838452efc55d38cd654a6d1f48a2c9f9e6e7c9a1ec0a8d0cb409bb23e0119b8d6b7
-
Filesize
168KB
MD58c6a65b146bb1aa19d789337521245a2
SHA1ca088a2a040f19c3f037228a462a3f84758254ff
SHA25681ab4d7931ec233253d3595d50ae95cbcfe11602859c867e9bd4bcbab372d033
SHA512c0ef717bb9d3ed302215b120c2b0f5cc9a23d389a926abdde738e6a5a0ff47054c9247d250226e29603825b4e18cc68824ec18ed3824d897bdd0f0fb7b340a96
-
Filesize
168KB
MD57c5a92de10284957f75124e008fcde34
SHA1772d73e35b369979c369bc0d6601c5ac86a29184
SHA2561378f82f38260937e57b6993292ece8262c2df8c4fbb4ed2d4bdefc255b9a01e
SHA5125a6d04de4130956ebdc1438b8457c3a4cbd84540b9cf0c6fc5291c677431a2eb0b12f2899af85e274757b8053d0cad01ea557fc1bf9a9fe463f2162f6a276b1a
-
Filesize
168KB
MD58c207ddb52c4ec0de67ca676d9ed2d6e
SHA161f1dd8f651ccaebbea5234a55cd5e249e96429b
SHA256ba7d1b392608da12969cd9dfc44b80a97837339328e1ffaf0658213567c4b40b
SHA5122e5f34c55f9af1154dca4221a7dd2002a53b99ae13eaee9b10a6e8e2aaa8c17e3d4d502a214b9ed99ad2b18a33f84c08ff129711f09e34b3249d565e67699786
-
Filesize
168KB
MD549b6e3242b0c25a325c3b66e4453c161
SHA127fe8b6ddfbf93af03d63813b91c68f1710d7a04
SHA2561b7aa52e2a0751f5476a9ea78d7083de013178893ad8381d562ea2f3d88f607a
SHA512698e30cf243ef719aeae3ce86ac9a2042628b53bad28d8e4d33ed596cf44aa193397c57fa96bb09d8d6c37ab9ddbe9dcc0b97f4774faaa1e79c4f2db7b6865d9