Analysis
-
max time kernel
144s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe
-
Size
168KB
-
MD5
ff3096404099df6df0b3ab73f94850ee
-
SHA1
46fe57291ed5c6a386e9ca617f6bfb9b0e98f82e
-
SHA256
1e376628cccd44fdf577f025c57391f359e9611c0153a5db49b718cf9b5e9d1a
-
SHA512
096675d920e62cf972b0cfa6255b827ce716eda5e09f845854c799e2e07d7978ccea923a461843c9f69d36d9d3e639d891bc53d9b701c10b8d1d9e59a61fba05
-
SSDEEP
1536:1EGh0oolq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oolqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409}\stubpath = "C:\\Windows\\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe" {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3E56FD8-2709-49d5-854D-4B3C3A700A94} {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B74F4057-5651-43ab-9F6F-600522157C2B} {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B} {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB}\stubpath = "C:\\Windows\\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe" 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70BA1DD2-C0D8-443f-977A-6B223E578785} {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{70BA1DD2-C0D8-443f-977A-6B223E578785}\stubpath = "C:\\Windows\\{70BA1DD2-C0D8-443f-977A-6B223E578785}.exe" {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E64E517-538B-4de3-B170-C6437A91197B}\stubpath = "C:\\Windows\\{5E64E517-538B-4de3-B170-C6437A91197B}.exe" {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB} 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409} {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F3E56FD8-2709-49d5-854D-4B3C3A700A94}\stubpath = "C:\\Windows\\{F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe" {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34F9F7A7-4AC9-4193-9820-65929D9D831F}\stubpath = "C:\\Windows\\{34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe" {81293FF5-E0D7-467b-835C-447C604A5141}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4}\stubpath = "C:\\Windows\\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe" {B74F4057-5651-43ab-9F6F-600522157C2B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA}\stubpath = "C:\\Windows\\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe" {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E64E517-538B-4de3-B170-C6437A91197B} {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81293FF5-E0D7-467b-835C-447C604A5141} {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81293FF5-E0D7-467b-835C-447C604A5141}\stubpath = "C:\\Windows\\{81293FF5-E0D7-467b-835C-447C604A5141}.exe" {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34F9F7A7-4AC9-4193-9820-65929D9D831F} {81293FF5-E0D7-467b-835C-447C604A5141}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B74F4057-5651-43ab-9F6F-600522157C2B}\stubpath = "C:\\Windows\\{B74F4057-5651-43ab-9F6F-600522157C2B}.exe" {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4} {B74F4057-5651-43ab-9F6F-600522157C2B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA} {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}\stubpath = "C:\\Windows\\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe" {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe -
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 1924 {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe 1072 {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe 2192 {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe 1604 {5E64E517-538B-4de3-B170-C6437A91197B}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe File created C:\Windows\{F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe File created C:\Windows\{81293FF5-E0D7-467b-835C-447C604A5141}.exe {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe File created C:\Windows\{34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe {81293FF5-E0D7-467b-835C-447C604A5141}.exe File created C:\Windows\{B74F4057-5651-43ab-9F6F-600522157C2B}.exe {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe File created C:\Windows\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe {B74F4057-5651-43ab-9F6F-600522157C2B}.exe File created C:\Windows\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe File created C:\Windows\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe File created C:\Windows\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe File created C:\Windows\{70BA1DD2-C0D8-443f-977A-6B223E578785}.exe {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe File created C:\Windows\{5E64E517-538B-4de3-B170-C6437A91197B}.exe {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {81293FF5-E0D7-467b-835C-447C604A5141}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B74F4057-5651-43ab-9F6F-600522157C2B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5E64E517-538B-4de3-B170-C6437A91197B}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe Token: SeIncBasePriorityPrivilege 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe Token: SeIncBasePriorityPrivilege 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe Token: SeIncBasePriorityPrivilege 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe Token: SeIncBasePriorityPrivilege 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe Token: SeIncBasePriorityPrivilege 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe Token: SeIncBasePriorityPrivilege 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe Token: SeIncBasePriorityPrivilege 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe Token: SeIncBasePriorityPrivilege 1924 {EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe Token: SeIncBasePriorityPrivilege 1072 {FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe Token: SeIncBasePriorityPrivilege 2192 {EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 580 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 29 PID 2604 wrote to memory of 580 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 29 PID 2604 wrote to memory of 580 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 29 PID 2604 wrote to memory of 580 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 29 PID 2604 wrote to memory of 2288 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 30 PID 2604 wrote to memory of 2288 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 30 PID 2604 wrote to memory of 2288 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 30 PID 2604 wrote to memory of 2288 2604 2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe 30 PID 580 wrote to memory of 2932 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 31 PID 580 wrote to memory of 2932 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 31 PID 580 wrote to memory of 2932 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 31 PID 580 wrote to memory of 2932 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 31 PID 580 wrote to memory of 2668 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 32 PID 580 wrote to memory of 2668 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 32 PID 580 wrote to memory of 2668 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 32 PID 580 wrote to memory of 2668 580 {56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe 32 PID 2932 wrote to memory of 2848 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 33 PID 2932 wrote to memory of 2848 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 33 PID 2932 wrote to memory of 2848 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 33 PID 2932 wrote to memory of 2848 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 33 PID 2932 wrote to memory of 2824 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 34 PID 2932 wrote to memory of 2824 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 34 PID 2932 wrote to memory of 2824 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 34 PID 2932 wrote to memory of 2824 2932 {BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe 34 PID 2848 wrote to memory of 2780 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 35 PID 2848 wrote to memory of 2780 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 35 PID 2848 wrote to memory of 2780 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 35 PID 2848 wrote to memory of 2780 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 35 PID 2848 wrote to memory of 3048 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 36 PID 2848 wrote to memory of 3048 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 36 PID 2848 wrote to memory of 3048 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 36 PID 2848 wrote to memory of 3048 2848 {70BA1DD2-C0D8-443f-977A-6B223E578785}.exe 36 PID 2780 wrote to memory of 3032 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 37 PID 2780 wrote to memory of 3032 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 37 PID 2780 wrote to memory of 3032 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 37 PID 2780 wrote to memory of 3032 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 37 PID 2780 wrote to memory of 2220 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 38 PID 2780 wrote to memory of 2220 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 38 PID 2780 wrote to memory of 2220 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 38 PID 2780 wrote to memory of 2220 2780 {F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe 38 PID 3032 wrote to memory of 300 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 39 PID 3032 wrote to memory of 300 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 39 PID 3032 wrote to memory of 300 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 39 PID 3032 wrote to memory of 300 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 39 PID 3032 wrote to memory of 1508 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 40 PID 3032 wrote to memory of 1508 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 40 PID 3032 wrote to memory of 1508 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 40 PID 3032 wrote to memory of 1508 3032 {81293FF5-E0D7-467b-835C-447C604A5141}.exe 40 PID 300 wrote to memory of 756 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 41 PID 300 wrote to memory of 756 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 41 PID 300 wrote to memory of 756 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 41 PID 300 wrote to memory of 756 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 41 PID 300 wrote to memory of 2452 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 42 PID 300 wrote to memory of 2452 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 42 PID 300 wrote to memory of 2452 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 42 PID 300 wrote to memory of 2452 300 {34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe 42 PID 756 wrote to memory of 1924 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 43 PID 756 wrote to memory of 1924 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 43 PID 756 wrote to memory of 1924 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 43 PID 756 wrote to memory of 1924 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 43 PID 756 wrote to memory of 2720 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 44 PID 756 wrote to memory of 2720 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 44 PID 756 wrote to memory of 2720 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 44 PID 756 wrote to memory of 2720 756 {B74F4057-5651-43ab-9F6F-600522157C2B}.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_ff3096404099df6df0b3ab73f94850ee_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exeC:\Windows\{56811ACC-C5B7-4c69-BCDE-F0266485F4DB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exeC:\Windows\{BEF9C0AA-CC4F-4226-A20B-B311D86A5409}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\{70BA1DD2-C0D8-443f-977A-6B223E578785}.exeC:\Windows\{70BA1DD2-C0D8-443f-977A-6B223E578785}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\{F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exeC:\Windows\{F3E56FD8-2709-49d5-854D-4B3C3A700A94}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\{81293FF5-E0D7-467b-835C-447C604A5141}.exeC:\Windows\{81293FF5-E0D7-467b-835C-447C604A5141}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\{34F9F7A7-4AC9-4193-9820-65929D9D831F}.exeC:\Windows\{34F9F7A7-4AC9-4193-9820-65929D9D831F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\{B74F4057-5651-43ab-9F6F-600522157C2B}.exeC:\Windows\{B74F4057-5651-43ab-9F6F-600522157C2B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exeC:\Windows\{EFBD9981-A7A9-4079-BD05-DF364A7D46F4}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exeC:\Windows\{FA630F41-DD46-4a28-A54B-D9E8EB3673AA}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exeC:\Windows\{EF5A808B-1E1A-4b3f-9610-F4451E1FE54B}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\{5E64E517-538B-4de3-B170-C6437A91197B}.exeC:\Windows\{5E64E517-538B-4de3-B170-C6437A91197B}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF5A8~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FA630~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFBD9~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B74F4~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34F9F~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{81293~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3E56~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{70BA1~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BEF9C~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56811~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b2bbdf90d3499237dcad450dddaad7c1
SHA1b088ca900ed9e029c4c23bc9a7b0a20951506c2e
SHA2563d73081e72c165880c702fae9dc239b65b8dabed140663861f836e7d4101a6df
SHA512be81e1a43464b9a1c3b2ac3092744849cc92076b068b1cca056ad4f604148e64f54681db9e1d40bc2d40df03b52d14f99f744c8dec8acf5bc965b09439fdc502
-
Filesize
168KB
MD516ca9bd55c31d37320ac8c8fc26a72d1
SHA1a64aa61a07fec6556adbfa0232e6a71a01d8cf8d
SHA256de6cf921c90ca44cc3fb4bebc167d09b445b0402bfa8f4e26e3154787048131f
SHA512a3f3a7e5c0d3a996b4468b50392b5edbe9e307341dab88502529b707440af1bc1ec66a447633fc1b5f4534c69fb5301c644c9e26cbc99c0bd0ee3e9f7f71d5ff
-
Filesize
168KB
MD5d7861b03a55d2fce423e05ccba8d4fe4
SHA1d1a4734befb9708363b95ef7aba3c4bac95321bc
SHA2561f74559b830b75f0891c2345df6d5794122848210240f4d1d3016aa204a716b2
SHA5124f2e4453f49a23ec2bc32d86f8326a88ad417638d12866d1e82a2e8b69ca9b659dda560fe01f1b71fdaf2252706bc85bba72aecf31e2389fe4d14977d9b9e8a5
-
Filesize
168KB
MD5f183fc71f186c25d1b46a4bccc1f6bac
SHA1559909b68c44ccba1775364c8fa48dea2297af9d
SHA256e4561ef986351a605558f44f4566b5bfced2e4414cf24c05596247af2a04094f
SHA512663fe295d5de3f3244319a92aeaf4e2f09d25f39951fce4c49d5f9343a6552c9fde1e9120746ae7b369ed3c841c2c62d4f6770698ef9fd514384843386d348ce
-
Filesize
168KB
MD58ea05ef0c9b20d42e8d37a549f1dbcd2
SHA12de96a56b3e4b5ef925c60fc3d9dd5854683ab0b
SHA256e276fffd54bf3fc184eb6272516ee60b9587d87dd85cc1795c483b9674858232
SHA5128c2c79ccde24bfb4e06448ea2771fa5c0913310f3e409a3203b62ab59e21aa144909b61ec4ff94c7dbcd52083e11594b8774a084e59d9b3371976cb622c3dff5
-
Filesize
168KB
MD535cc614ce3ba2989a61cb97380242de3
SHA1a32a708c217423b4f9cbe4dce95caccf9717fd7a
SHA256f2d581771991c8c8d38070e70dace0836f4a44d7d69ec6d6673d889f715997ac
SHA51245d3a25a140dde4f73e893aff64947ac19f989af9b1bc414e565b7bc47c24a6b07779de1b48da1e32e651951de765fac04d6ba40ad0ed26211ef8aad17d65240
-
Filesize
168KB
MD5f02e9ea18f81ac2b792c32580d70172c
SHA187ddd79b2b8e19239c9c8af6bf441d58321ebc90
SHA2566f0d806c543008196deac980a140d542593f3158d3fa2603a74a2716ab5cc55b
SHA5129fa01fd93626ded77ce7f1115c6d4f93a560ad84c2ba4a9496d2d16caf0a84c5149215d40f2ce7850805f0b908828c66bac48b861ecc592f442432e0c896c7f0
-
Filesize
168KB
MD55488337c848770bbfcf1e93725654312
SHA12fdfb7379f74cb4e179d9f196b607aabec29e5bb
SHA256eb244616fb0396fc415705d9b29314389e86bc9a248436099f697683a8bb49e2
SHA51234264204c0177a01c0e2931194a7ccc119b1988927193f65c248b369f9629719378326e51234979a5fb6abf262b49b85045e849aa95e919b7a483256d403eafe
-
Filesize
168KB
MD512ecaf10cadc048ba969992003dd6eaf
SHA17be76f8622f23460220ece7321df2c3cfe9e7705
SHA256a93b79baa1cf53a781bc761db7bb62faf22e368245f4d166418c306cffa73bec
SHA512ca6b3292b9e1826418cad0ae47e67ad22f2f0ad051896d92fe242c12b7409644f4375af4e6831fb0783d040a86fa885aa2b4dbcf0093082b336dc31d86b568e3
-
Filesize
168KB
MD5b98fc17f280bc3a4fb5c13ee1c68e5da
SHA18605e76390a4db3902dcbe5b6715cc483b76f631
SHA256bed7dac7e761e48c71bce071e56d7f6ff8c9fc01c21fdfa5f13b01ed21885087
SHA5123303afc56fc2d3f3424481317afd4960765e4cf9d301a8820bf3c86caf85a5ec3ec3cb0a79248477ab0840c05a372601a9ce65a716bddee348596cf2981349ec
-
Filesize
168KB
MD580ae44131ed651816d6aa931250d7486
SHA13ad91232a8635fc7ecdc3142f1a3589a1a70f746
SHA256e12fd224c196dd246d5f04ffe0b5bdc3f52d18ecea408cd3ebc4603e65468854
SHA51268aac58ff786a278333831a128246227de8e1d57db881d2f9f26e5a3c86110288a07200ba6fc889eff96aecf2ca8772bdf19fe047e57b84fd7fae2ee24b1f03b