Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe
-
Size
372KB
-
MD5
f2de1dcc1aa5d57624473e92a6bbcab7
-
SHA1
05277f83e4f261c7df9e7860d873c4df64b18584
-
SHA256
bc40de42f21116925de31b5be765772fd934bd7d23ff0079db5a5280bdf0afeb
-
SHA512
cd02c43830105e68a6931ea094ee81774cd827eecd793f4c93fb9887e394ba5409cb5973a163b6134c1d371dcdd9cfe3e36e903877c327dda963ff24ec1e29e7
-
SSDEEP
3072:CEGh0o/mlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGMl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71F32131-4CBC-4d65-B14E-8410EDAD423D} {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16EF236D-4767-4434-8BD8-A567F8AC1764} {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16EF236D-4767-4434-8BD8-A567F8AC1764}\stubpath = "C:\\Windows\\{16EF236D-4767-4434-8BD8-A567F8AC1764}.exe" {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D058389-99B2-4a6c-B794-0A0CC65D58C5} {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6B2E94C-42E4-4284-A65B-30E44D0014F7}\stubpath = "C:\\Windows\\{A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe" {E5881930-A9A3-4094-9187-A57F31242046}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1F9DC97-B964-47d8-88D9-E621790CA326} 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D83CEA4C-12A4-4e84-94B2-271051860FF9}\stubpath = "C:\\Windows\\{D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe" {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5881930-A9A3-4094-9187-A57F31242046} {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{829AB9BB-770A-42df-821F-90A60DDA72FC} {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{829AB9BB-770A-42df-821F-90A60DDA72FC}\stubpath = "C:\\Windows\\{829AB9BB-770A-42df-821F-90A60DDA72FC}.exe" {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}\stubpath = "C:\\Windows\\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exe" {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D83CEA4C-12A4-4e84-94B2-271051860FF9} {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA0FDF86-18A0-4dce-9D85-49310289235E} {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA0FDF86-18A0-4dce-9D85-49310289235E}\stubpath = "C:\\Windows\\{BA0FDF86-18A0-4dce-9D85-49310289235E}.exe" {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6B2E94C-42E4-4284-A65B-30E44D0014F7} {E5881930-A9A3-4094-9187-A57F31242046}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1F9DC97-B964-47d8-88D9-E621790CA326}\stubpath = "C:\\Windows\\{E1F9DC97-B964-47d8-88D9-E621790CA326}.exe" 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71F32131-4CBC-4d65-B14E-8410EDAD423D}\stubpath = "C:\\Windows\\{71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe" {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1} {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}\stubpath = "C:\\Windows\\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe" {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D058389-99B2-4a6c-B794-0A0CC65D58C5}\stubpath = "C:\\Windows\\{5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe" {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E5881930-A9A3-4094-9187-A57F31242046}\stubpath = "C:\\Windows\\{E5881930-A9A3-4094-9187-A57F31242046}.exe" {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1} {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe -
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 376 {E5881930-A9A3-4094-9187-A57F31242046}.exe 2288 {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe 2376 {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe 1088 {7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe File created C:\Windows\{16EF236D-4767-4434-8BD8-A567F8AC1764}.exe {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe File created C:\Windows\{5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe File created C:\Windows\{E5881930-A9A3-4094-9187-A57F31242046}.exe {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe File created C:\Windows\{A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe {E5881930-A9A3-4094-9187-A57F31242046}.exe File created C:\Windows\{829AB9BB-770A-42df-821F-90A60DDA72FC}.exe {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe File created C:\Windows\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exe {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe File created C:\Windows\{D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe File created C:\Windows\{71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe File created C:\Windows\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe File created C:\Windows\{BA0FDF86-18A0-4dce-9D85-49310289235E}.exe {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E5881930-A9A3-4094-9187-A57F31242046}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe Token: SeIncBasePriorityPrivilege 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe Token: SeIncBasePriorityPrivilege 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe Token: SeIncBasePriorityPrivilege 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe Token: SeIncBasePriorityPrivilege 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe Token: SeIncBasePriorityPrivilege 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe Token: SeIncBasePriorityPrivilege 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe Token: SeIncBasePriorityPrivilege 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe Token: SeIncBasePriorityPrivilege 376 {E5881930-A9A3-4094-9187-A57F31242046}.exe Token: SeIncBasePriorityPrivilege 2288 {A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe Token: SeIncBasePriorityPrivilege 2376 {829AB9BB-770A-42df-821F-90A60DDA72FC}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2528 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 31 PID 2096 wrote to memory of 2528 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 31 PID 2096 wrote to memory of 2528 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 31 PID 2096 wrote to memory of 2528 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 31 PID 2096 wrote to memory of 1628 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 32 PID 2096 wrote to memory of 1628 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 32 PID 2096 wrote to memory of 1628 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 32 PID 2096 wrote to memory of 1628 2096 2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe 32 PID 2528 wrote to memory of 2320 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 33 PID 2528 wrote to memory of 2320 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 33 PID 2528 wrote to memory of 2320 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 33 PID 2528 wrote to memory of 2320 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 33 PID 2528 wrote to memory of 2768 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 34 PID 2528 wrote to memory of 2768 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 34 PID 2528 wrote to memory of 2768 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 34 PID 2528 wrote to memory of 2768 2528 {E1F9DC97-B964-47d8-88D9-E621790CA326}.exe 34 PID 2320 wrote to memory of 2876 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 35 PID 2320 wrote to memory of 2876 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 35 PID 2320 wrote to memory of 2876 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 35 PID 2320 wrote to memory of 2876 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 35 PID 2320 wrote to memory of 2880 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 36 PID 2320 wrote to memory of 2880 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 36 PID 2320 wrote to memory of 2880 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 36 PID 2320 wrote to memory of 2880 2320 {D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe 36 PID 2876 wrote to memory of 2860 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 37 PID 2876 wrote to memory of 2860 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 37 PID 2876 wrote to memory of 2860 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 37 PID 2876 wrote to memory of 2860 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 37 PID 2876 wrote to memory of 2784 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 38 PID 2876 wrote to memory of 2784 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 38 PID 2876 wrote to memory of 2784 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 38 PID 2876 wrote to memory of 2784 2876 {71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe 38 PID 2860 wrote to memory of 2692 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 39 PID 2860 wrote to memory of 2692 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 39 PID 2860 wrote to memory of 2692 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 39 PID 2860 wrote to memory of 2692 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 39 PID 2860 wrote to memory of 2312 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 40 PID 2860 wrote to memory of 2312 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 40 PID 2860 wrote to memory of 2312 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 40 PID 2860 wrote to memory of 2312 2860 {060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe 40 PID 2692 wrote to memory of 1232 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 41 PID 2692 wrote to memory of 1232 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 41 PID 2692 wrote to memory of 1232 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 41 PID 2692 wrote to memory of 1232 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 41 PID 2692 wrote to memory of 2812 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 42 PID 2692 wrote to memory of 2812 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 42 PID 2692 wrote to memory of 2812 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 42 PID 2692 wrote to memory of 2812 2692 {16EF236D-4767-4434-8BD8-A567F8AC1764}.exe 42 PID 1232 wrote to memory of 2040 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 44 PID 1232 wrote to memory of 2040 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 44 PID 1232 wrote to memory of 2040 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 44 PID 1232 wrote to memory of 2040 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 44 PID 1232 wrote to memory of 1276 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 45 PID 1232 wrote to memory of 1276 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 45 PID 1232 wrote to memory of 1276 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 45 PID 1232 wrote to memory of 1276 1232 {BA0FDF86-18A0-4dce-9D85-49310289235E}.exe 45 PID 2040 wrote to memory of 376 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 46 PID 2040 wrote to memory of 376 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 46 PID 2040 wrote to memory of 376 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 46 PID 2040 wrote to memory of 376 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 46 PID 2040 wrote to memory of 2980 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 47 PID 2040 wrote to memory of 2980 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 47 PID 2040 wrote to memory of 2980 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 47 PID 2040 wrote to memory of 2980 2040 {5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_f2de1dcc1aa5d57624473e92a6bbcab7_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\{E1F9DC97-B964-47d8-88D9-E621790CA326}.exeC:\Windows\{E1F9DC97-B964-47d8-88D9-E621790CA326}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\{D83CEA4C-12A4-4e84-94B2-271051860FF9}.exeC:\Windows\{D83CEA4C-12A4-4e84-94B2-271051860FF9}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\{71F32131-4CBC-4d65-B14E-8410EDAD423D}.exeC:\Windows\{71F32131-4CBC-4d65-B14E-8410EDAD423D}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exeC:\Windows\{060AE027-A6EF-41ac-88D6-24C1FB4F6FD1}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\{16EF236D-4767-4434-8BD8-A567F8AC1764}.exeC:\Windows\{16EF236D-4767-4434-8BD8-A567F8AC1764}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\{BA0FDF86-18A0-4dce-9D85-49310289235E}.exeC:\Windows\{BA0FDF86-18A0-4dce-9D85-49310289235E}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\{5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exeC:\Windows\{5D058389-99B2-4a6c-B794-0A0CC65D58C5}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\{E5881930-A9A3-4094-9187-A57F31242046}.exeC:\Windows\{E5881930-A9A3-4094-9187-A57F31242046}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\{A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exeC:\Windows\{A6B2E94C-42E4-4284-A65B-30E44D0014F7}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\{829AB9BB-770A-42df-821F-90A60DDA72FC}.exeC:\Windows\{829AB9BB-770A-42df-821F-90A60DDA72FC}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exeC:\Windows\{7DE9CD76-A686-40cf-B0E9-4A1B4EF441D1}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{829AB~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A6B2E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5881~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D058~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA0FD~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16EF2~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{060AE~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71F32~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D83CE~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1F9D~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD52d596ab28ca1cfe8c6f00efb1f6ada3e
SHA1d7022f788449280c077be4b2cd778984eb930d34
SHA2560044abb3a4473f7a78f0749fd7f5d6006167b4f91527f6cd6be0c84bc9866e48
SHA512a4388817ebe0a4bbdd2a305fcad6c5fc1ea959b6132fc5ea74fd0fa179005323d164963df64269eee03f9c715a38b9716cc18f9c91926be038a88afdd13b3065
-
Filesize
372KB
MD53b354f255648f86f2a7ae0b22bc0cd6c
SHA17947fad8887e03f91f027aab5cec82cdf7a2c272
SHA256f45c4f4166e0ce7851ee92f172a84b77ef6763648b305d8e5ea2fee87c7067f7
SHA512740b1f4157d88ad7355b40dd98e08442ac680152becb5f71e31e4844b4b39a917e4bdb7cd33beb5f427c95255f4b016bfc4ddbffa1c5d16842e0d04675462bd3
-
Filesize
372KB
MD57e0f9523eab4846d7e0278f59e0b9030
SHA15624bb3e7868362ef9922f8e37474c2583cfbf9e
SHA2569f46483b16747a3c300d58f36d821901d68793be16071c30784b41e63f56b551
SHA512490b181602678a6726b45345933429014d6d6ef8e9a4accee7a1c02063d8cbab89cae5355c0eddbe1dea7bffc25618da92903590bbb9ed0294768eb564ff0af5
-
Filesize
372KB
MD5fa4c4f971c13a4cdb70b1e27440e07b9
SHA135343720c27dc3e4653f07acc357a4c7d5f84e41
SHA256b4b2544d8176f8688d677d48985d6fff8a299d8adb5edc5b14a3d47e3007cf49
SHA512ed7ef2a44513961c17924a0555d63e1c58051b62df06f49027cc06a4b9d7a07b53a13c95e8bcc51337beaaaca3111ec5af28e44d8fdc546576d2c30aed5110c3
-
Filesize
372KB
MD5f1ebb44f8f810b30c8c53789003af2c5
SHA102257270a4020b3701935d76d6a85fed6b75c771
SHA25608bc904c458a86b796c2d8c41f06bbfca2a87d64b2072836f7ff76b7493001b2
SHA51269db2035af494e768c086801a0b3bd5a891853920415b31412912296eaabae455e31d54a215ff8c4085eb89c20bac7f4bc6cbf0af4172aaf95e003aedbeb16ed
-
Filesize
372KB
MD53239446949c43506fd846883b0e27275
SHA18a04c870912f9c8e453fba737bdc5c35a3522c08
SHA256836af93e438fadb76da51e66bc996bda5d2309b3bf81d74459ae823a4388b916
SHA512f04359b702d3ccced561d3cf3e422086b17f731da658b98fc5d782111f33a831c3346b33c1f91cb35fef9cdd5c46941e6eb0f12d461e27c236fe4726d11b6f51
-
Filesize
372KB
MD5ab5697f0e8f7180848704e35f20086ad
SHA19ec03888b07742db112a7be313c7f6ddcd0a907e
SHA256620a6e14c5a7efb5b1b56b3dbdde05c1f21454fe8799e44ed47ce454ff00677e
SHA51297a047c278b1bad8182f399a9b9881dd4957ed4f96dca20eda115a2c84f695eaaeea1912bef5c87b04ba8355717e87fd9720476ff2fc776a4db86af99aeb89b0
-
Filesize
372KB
MD520b8acf6c3c928cc6f69791a928673dc
SHA1e95c6cb2543e13fd5ca58e8fc2c9e4af08b50e8e
SHA2565a67be58a48c2adca66f9ece20aff9fd6f45065724a160a0fbf3f9330a030378
SHA512ad3973a0734df506ccd58d262dc7dfd6c94b800d8aad2dd0cb09f59848f25674df8ca42899380331f1032ff63c05157bcb1d5c1570df1b62c49173a47d984af5
-
Filesize
372KB
MD55b57e8670ec1126481b61c82861c8a0e
SHA15a4fc454de5e07ac11222a367424d8c8e7a8851c
SHA256a2694bd0e028c41bb1da6bbcc91b74e4e6aeaf7fdd50461a1eac069bc09a2010
SHA512d1da317f74da9e47f2fbe806d670c1ffd99b70955b475c1398df754ecd9495a3da4327e985b07da543f17eaf891df246b52c44c245c62d12aa670af5aea19d03
-
Filesize
372KB
MD5651deb222a99ae24ba15c865f2764946
SHA1baaf81c47836a5322c96408baa816a582a4705ca
SHA256ea4e72fcebbe59648a03a7cb7590697a049e93148215abb609db6017792cf6f2
SHA512beb0161f1e5bcf8c65f00714c305e2a36e2d1f7f94ebd6f29176ea5b4651b090f475dc54a9e00a72c71be52d90593da42e2b31d4f95bec5417d5036b7be5912b
-
Filesize
372KB
MD5b367bf6f4b785559acc694f4ef691a5c
SHA187d34c320bdec116f366040241dcc3b73fb9fc21
SHA2568c98e495c70d14ced5b282808985bd9a7817d598fab17fb4627ac3f57396aa53
SHA51274f31ea3d01fce133b15df8e784e9bc9dd197c8ea258827953f80007033aa7ea085fdfd7bb2c02ad13697d662d81f079d46a4cdc84f697178c44945147d588f8