Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe
-
Size
408KB
-
MD5
3eead2881c1f747f622951ab207e3d6c
-
SHA1
a59f7b499a2c52bc944bc1c640b79c5910ab598c
-
SHA256
de2a00b71bacb015bc38112a3988987fbda6fe9da3053898d75b0d3d9375733e
-
SHA512
8e9f12d8a704ec08ef52d69e93697e7333a06114b6d38419937a74f83cd0e9803c89232d8376482b152521a657d5745916804ad30bd6c5cb2561b4a678a7ad8e
-
SSDEEP
3072:CEGh0o5l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGHldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FCBD6F-EE3E-4219-9145-4572A100E219}\stubpath = "C:\\Windows\\{B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe" {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88}\stubpath = "C:\\Windows\\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe" {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE0731CE-4452-4677-9B06-18EF3857C1F9}\stubpath = "C:\\Windows\\{DE0731CE-4452-4677-9B06-18EF3857C1F9}.exe" {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}\stubpath = "C:\\Windows\\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe" {0D68A455-C443-4017-A45E-F56DD9121573}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}\stubpath = "C:\\Windows\\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe" {183856D7-2423-4248-8326-70A7C5157C3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6FCBD6F-EE3E-4219-9145-4572A100E219} {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D68A455-C443-4017-A45E-F56DD9121573} {25D97132-8157-4360-8C3F-9F022B769DB3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D68A455-C443-4017-A45E-F56DD9121573}\stubpath = "C:\\Windows\\{0D68A455-C443-4017-A45E-F56DD9121573}.exe" {25D97132-8157-4360-8C3F-9F022B769DB3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55} {0D68A455-C443-4017-A45E-F56DD9121573}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F} {183856D7-2423-4248-8326-70A7C5157C3B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A} {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88} {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE}\stubpath = "C:\\Windows\\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe" 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25D97132-8157-4360-8C3F-9F022B769DB3} {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE0731CE-4452-4677-9B06-18EF3857C1F9} {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{183856D7-2423-4248-8326-70A7C5157C3B} {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{183856D7-2423-4248-8326-70A7C5157C3B}\stubpath = "C:\\Windows\\{183856D7-2423-4248-8326-70A7C5157C3B}.exe" {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A}\stubpath = "C:\\Windows\\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe" {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96} {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96}\stubpath = "C:\\Windows\\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe" {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE} 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25D97132-8157-4360-8C3F-9F022B769DB3}\stubpath = "C:\\Windows\\{25D97132-8157-4360-8C3F-9F022B769DB3}.exe" {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 376 {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe 664 {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe 1128 {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe 2512 {DE0731CE-4452-4677-9B06-18EF3857C1F9}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe {183856D7-2423-4248-8326-70A7C5157C3B}.exe File created C:\Windows\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe File created C:\Windows\{DE0731CE-4452-4677-9B06-18EF3857C1F9}.exe {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe File created C:\Windows\{25D97132-8157-4360-8C3F-9F022B769DB3}.exe {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe File created C:\Windows\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe {0D68A455-C443-4017-A45E-F56DD9121573}.exe File created C:\Windows\{183856D7-2423-4248-8326-70A7C5157C3B}.exe {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe File created C:\Windows\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe File created C:\Windows\{B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe File created C:\Windows\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe File created C:\Windows\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe File created C:\Windows\{0D68A455-C443-4017-A45E-F56DD9121573}.exe {25D97132-8157-4360-8C3F-9F022B769DB3}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {25D97132-8157-4360-8C3F-9F022B769DB3}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0D68A455-C443-4017-A45E-F56DD9121573}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {183856D7-2423-4248-8326-70A7C5157C3B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {DE0731CE-4452-4677-9B06-18EF3857C1F9}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe Token: SeIncBasePriorityPrivilege 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe Token: SeIncBasePriorityPrivilege 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe Token: SeIncBasePriorityPrivilege 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe Token: SeIncBasePriorityPrivilege 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe Token: SeIncBasePriorityPrivilege 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe Token: SeIncBasePriorityPrivilege 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe Token: SeIncBasePriorityPrivilege 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe Token: SeIncBasePriorityPrivilege 376 {0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe Token: SeIncBasePriorityPrivilege 664 {B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe Token: SeIncBasePriorityPrivilege 1128 {6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2828 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 31 PID 1916 wrote to memory of 2828 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 31 PID 1916 wrote to memory of 2828 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 31 PID 1916 wrote to memory of 2828 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 31 PID 1916 wrote to memory of 2944 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 32 PID 1916 wrote to memory of 2944 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 32 PID 1916 wrote to memory of 2944 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 32 PID 1916 wrote to memory of 2944 1916 2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe 32 PID 2828 wrote to memory of 2792 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 33 PID 2828 wrote to memory of 2792 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 33 PID 2828 wrote to memory of 2792 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 33 PID 2828 wrote to memory of 2792 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 33 PID 2828 wrote to memory of 2672 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 34 PID 2828 wrote to memory of 2672 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 34 PID 2828 wrote to memory of 2672 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 34 PID 2828 wrote to memory of 2672 2828 {A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe 34 PID 2792 wrote to memory of 2780 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 35 PID 2792 wrote to memory of 2780 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 35 PID 2792 wrote to memory of 2780 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 35 PID 2792 wrote to memory of 2780 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 35 PID 2792 wrote to memory of 2632 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 36 PID 2792 wrote to memory of 2632 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 36 PID 2792 wrote to memory of 2632 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 36 PID 2792 wrote to memory of 2632 2792 {25D97132-8157-4360-8C3F-9F022B769DB3}.exe 36 PID 2780 wrote to memory of 2816 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 37 PID 2780 wrote to memory of 2816 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 37 PID 2780 wrote to memory of 2816 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 37 PID 2780 wrote to memory of 2816 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 37 PID 2780 wrote to memory of 2560 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 38 PID 2780 wrote to memory of 2560 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 38 PID 2780 wrote to memory of 2560 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 38 PID 2780 wrote to memory of 2560 2780 {0D68A455-C443-4017-A45E-F56DD9121573}.exe 38 PID 2816 wrote to memory of 2940 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 39 PID 2816 wrote to memory of 2940 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 39 PID 2816 wrote to memory of 2940 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 39 PID 2816 wrote to memory of 2940 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 39 PID 2816 wrote to memory of 2008 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 40 PID 2816 wrote to memory of 2008 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 40 PID 2816 wrote to memory of 2008 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 40 PID 2816 wrote to memory of 2008 2816 {D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe 40 PID 2940 wrote to memory of 1344 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 42 PID 2940 wrote to memory of 1344 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 42 PID 2940 wrote to memory of 1344 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 42 PID 2940 wrote to memory of 1344 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 42 PID 2940 wrote to memory of 304 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 43 PID 2940 wrote to memory of 304 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 43 PID 2940 wrote to memory of 304 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 43 PID 2940 wrote to memory of 304 2940 {183856D7-2423-4248-8326-70A7C5157C3B}.exe 43 PID 1344 wrote to memory of 1164 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 44 PID 1344 wrote to memory of 1164 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 44 PID 1344 wrote to memory of 1164 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 44 PID 1344 wrote to memory of 1164 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 44 PID 1344 wrote to memory of 324 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 45 PID 1344 wrote to memory of 324 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 45 PID 1344 wrote to memory of 324 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 45 PID 1344 wrote to memory of 324 1344 {0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe 45 PID 1164 wrote to memory of 376 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 46 PID 1164 wrote to memory of 376 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 46 PID 1164 wrote to memory of 376 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 46 PID 1164 wrote to memory of 376 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 46 PID 1164 wrote to memory of 2384 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 47 PID 1164 wrote to memory of 2384 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 47 PID 1164 wrote to memory of 2384 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 47 PID 1164 wrote to memory of 2384 1164 {874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_3eead2881c1f747f622951ab207e3d6c_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exeC:\Windows\{A6E12F6A-C6CA-43f7-B28C-D6306184FADE}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\{25D97132-8157-4360-8C3F-9F022B769DB3}.exeC:\Windows\{25D97132-8157-4360-8C3F-9F022B769DB3}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\{0D68A455-C443-4017-A45E-F56DD9121573}.exeC:\Windows\{0D68A455-C443-4017-A45E-F56DD9121573}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exeC:\Windows\{D4672468-5F6F-4295-BEE5-B4CD1BEA4E55}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\{183856D7-2423-4248-8326-70A7C5157C3B}.exeC:\Windows\{183856D7-2423-4248-8326-70A7C5157C3B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exeC:\Windows\{0797BBFE-CB8B-4b2d-958F-ED8FCEDA1A2F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exeC:\Windows\{874A2F4D-94BE-4d6c-835D-A97BC5992B3A}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exeC:\Windows\{0E4D1346-CFD4-4b22-A40C-E3A02D648E96}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\{B6FCBD6F-EE3E-4219-9145-4572A100E219}.exeC:\Windows\{B6FCBD6F-EE3E-4219-9145-4572A100E219}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:664 -
C:\Windows\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exeC:\Windows\{6C000E59-74A6-48cd-A627-C9B9C8EF1A88}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Windows\{DE0731CE-4452-4677-9B06-18EF3857C1F9}.exeC:\Windows\{DE0731CE-4452-4677-9B06-18EF3857C1F9}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C000~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6FCB~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0E4D1~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{874A2~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0797B~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{18385~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D4672~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D68A~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{25D97~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6E12~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD55ca78d1c13137d43d7d416a95d1f4721
SHA11e5be8d33db8ae91a871004eb256cd7731616941
SHA2564d99095349b902f59ee9e6976d1640cdfa786d07d0155100289d47fcbefec10f
SHA5123ed7c2ec00032afbc883f5b630852eb519cf21ba7a93a5207319c78c6bdb8dd3abe539b1c7efe14ba1be7433adc7ecb26e9e2a0bb85c96a461adf037a90c2338
-
Filesize
408KB
MD579547e823d9cd31b818e81e938cd878f
SHA1a0cc1a7a1d841e8bef96ef6bb4dbadfdcb7cf6f3
SHA256275d8b0bdbefe0e20c9969beb019a76fb9fd2c0803c28df34ff4ef3707aed8cf
SHA512de7f82fd952cdab61ef646e1fbc773322c9c8cd2d284d69ce1b94477b1e235958b7ad766f5082738b63aa367c2a9c1c745aeb3408f0c1c2162f7f37e264ebb1e
-
Filesize
408KB
MD59af392f7c9705523349f3e40e3b41367
SHA1623940ff64a598f1f3b97ea00978ea0a4c7219e4
SHA2561dde0065be371f73662a58d172d61d248894addc32043e25c12fae23a9db5404
SHA512893c0879e6a05d2af3e4550c215f8f5551e73cf3d3a86e53b3eee3479f5d46a3bcd810c6b1d90dbc56e209f6ffae2a9c5ad1a0a18108094773fbb21b44e9c206
-
Filesize
408KB
MD5613bffdfa59302689c1eee45c9f92a78
SHA1231c075852e057bc1ff4da2a2188d7aac92921d6
SHA25650f725680eff2a38fd893156a96a8a259c4f8d258c332a185b710b5e064d0a96
SHA512fefec902a6e8593cc876f0694d4cf87fdc0d68bebb25015a098af26b01e6a82435bbf3024b4adb87dfb629bb6f9b50f3b31ec0a81cc641834ee6b52d90f25c06
-
Filesize
408KB
MD5b3bd6fae4cc19a090d43771e5349fdcc
SHA1a32701a9b5fd53b73f99062da39e43004a155d81
SHA256aadbf4e4f74c98b8aba938d6fe01ad941ac569fb6d4821b49c384d063e62cdaa
SHA512d1673a775f7837ad5b0650ff02b8ac6224eb1682e17e77c1def3cbbdb23042f50a97ac618ba630207e2241f23279fb677a1905a8b4a3d389ffdfdbccedd79cec
-
Filesize
408KB
MD5071dfc7d1dccfbc027c7d8d766e9daaf
SHA15ba5a1d40e52b65eeba6ca9ded787c0ecfebda18
SHA2565c2b954387b7ee20f7255710cbdb16092a7168c2982f935de52a8820ae72ad8c
SHA51246cd1919fab7a3df7ba56a95c89dbd824a769134f1dbc7b9e1539a8df05a3f225662a6d1777eed726e1aea7ef037191e2802138546036f5d65ff9b5aaaeb0457
-
Filesize
408KB
MD5a8589c98b5161841e623e16e5f6e207b
SHA1a9717265f8b291dd034f0d3422fa4b5ba8589c18
SHA256e7ae605717a97cecbb6af5f60861224d21dcf6be868daf94657ea7690f74918c
SHA51289116db1cc9422df441cea3a503f4b89ad88571d3b7d4b4a00a40f006a32d3e7091602f39ff89798fea8f7ac38810e6c2d7f5405653b715fa9818bc2516d8bbe
-
Filesize
408KB
MD51d8d21971f31d94d33acbf07e60e08f6
SHA144bc546b132c1ff5fb6f91d1a36bb84a493cde43
SHA256b8d0f2c3aec4a481b360be0da2f0e3e72f65773566118922233299c253dd7607
SHA512dfb7c2a2cc4dbffb26f651af8e68ce412bd037ea76b9cba803380e59da3f78e029344019fee2941cff2602ca1c19c3c544bf538d0522d0cd50ce22b5fb5b4e74
-
Filesize
408KB
MD5982ba0036b6775ec0c5447fe327ce315
SHA1bf358c8afdf0fe98b41176113f183f4916e7600a
SHA256a8a09c3b5c6ad259b8e0f4a46ab0daa152c25d1bb31752d97076077298dcd3d3
SHA512f3f583cccc2ef91f0f9cf6a7c8e557fdab95baa409dcdc17b780ae32701ce48c17dc484c211dafcade1eeb8d9c35b369aee740fc08600165d5061055500d00c7
-
Filesize
408KB
MD5698dbef0ee523dcc9a631c85fd964c9a
SHA1aaf1efd4a53129f34cf8827399c39ad75543a35a
SHA256858549209c08a92d1555b597cc5fb2211a8e82248894455e0384e4cbe1533ba7
SHA51203650da05cd6c405ac2e16247419c91f4999be58fce775d659b377008e3daf22e455a847ee8481650460c27a088505c32bf90c48d144247ef02e7d4935bdca07
-
Filesize
408KB
MD578f6213d8f7182fb0d4a0324cf1ce2c8
SHA1acb4c82d718e6ec332d8ae74399a6120a9d6955d
SHA256836dee2ad402b48d38462f215eff7ea7abae6b6a26861b1c4f8a83effd0a1e52
SHA512989da746329955e955d643836af1beb115760319f88d6cdf4c6bd4f0610572855298ddf8d44f63292f0a9c8869c4d78ca3e03a5bd5fb3139802731b10e74f5ed