Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe
-
Size
372KB
-
MD5
8b11e32b06c58c5023dc6d550d0b8036
-
SHA1
53080cab6c65e90b28390e9a3ace8190ddebf347
-
SHA256
12342783aea1d93b0427529d19f92b0b8fe854e326647a97dd93680aecb43df4
-
SHA512
a6fe80a23d7a0be52dbb229b21f3e66131db33676617f2956e7de935e860a2f3a40ed716516415a4fd1ff15d719b55e0026b7bd4d7dadac70141315af6ff0a97
-
SSDEEP
3072:CEGh0ozmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGwl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{277D873B-35B1-4d42-8A52-C9F8E7978348} {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{277D873B-35B1-4d42-8A52-C9F8E7978348}\stubpath = "C:\\Windows\\{277D873B-35B1-4d42-8A52-C9F8E7978348}.exe" {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D00A1302-98AE-48b8-905A-72DF337DD993}\stubpath = "C:\\Windows\\{D00A1302-98AE-48b8-905A-72DF337DD993}.exe" {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8} {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A} {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B7B6B101-0800-44e7-83EE-4E8C934291E8} {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB} {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B7B6B101-0800-44e7-83EE-4E8C934291E8}\stubpath = "C:\\Windows\\{B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe" {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A19F290-0A10-4829-B0AF-D95A42E32D8A} 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}\stubpath = "C:\\Windows\\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe" {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78} {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}\stubpath = "C:\\Windows\\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe" {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B14D94F5-5AD6-4ba5-B540-7672A158E480}\stubpath = "C:\\Windows\\{B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe" {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D00A1302-98AE-48b8-905A-72DF337DD993} {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78}\stubpath = "C:\\Windows\\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe" {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5} {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5}\stubpath = "C:\\Windows\\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe" {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}\stubpath = "C:\\Windows\\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe" {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A23CF3DC-D257-4aac-80AE-50795201A3A9} {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A23CF3DC-D257-4aac-80AE-50795201A3A9}\stubpath = "C:\\Windows\\{A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe" {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B14D94F5-5AD6-4ba5-B540-7672A158E480} {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A19F290-0A10-4829-B0AF-D95A42E32D8A}\stubpath = "C:\\Windows\\{8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe" 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76} {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A}\stubpath = "C:\\Windows\\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe" {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe -
Executes dropped EXE 12 IoCs
pid Process 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe 1444 {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe 2532 {D00A1302-98AE-48b8-905A-72DF337DD993}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe File created C:\Windows\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe File created C:\Windows\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe File created C:\Windows\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe File created C:\Windows\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe File created C:\Windows\{A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe File created C:\Windows\{B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe File created C:\Windows\{B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe File created C:\Windows\{D00A1302-98AE-48b8-905A-72DF337DD993}.exe {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe File created C:\Windows\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe File created C:\Windows\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe File created C:\Windows\{277D873B-35B1-4d42-8A52-C9F8E7978348}.exe {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D00A1302-98AE-48b8-905A-72DF337DD993}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe Token: SeIncBasePriorityPrivilege 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe Token: SeIncBasePriorityPrivilege 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe Token: SeIncBasePriorityPrivilege 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe Token: SeIncBasePriorityPrivilege 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe Token: SeIncBasePriorityPrivilege 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe Token: SeIncBasePriorityPrivilege 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe Token: SeIncBasePriorityPrivilege 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe Token: SeIncBasePriorityPrivilege 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe Token: SeIncBasePriorityPrivilege 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe Token: SeIncBasePriorityPrivilege 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe Token: SeIncBasePriorityPrivilege 1444 {B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3316 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 86 PID 4044 wrote to memory of 3316 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 86 PID 4044 wrote to memory of 3316 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 86 PID 4044 wrote to memory of 2008 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 87 PID 4044 wrote to memory of 2008 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 87 PID 4044 wrote to memory of 2008 4044 2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe 87 PID 3316 wrote to memory of 2572 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 88 PID 3316 wrote to memory of 2572 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 88 PID 3316 wrote to memory of 2572 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 88 PID 3316 wrote to memory of 4724 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 89 PID 3316 wrote to memory of 4724 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 89 PID 3316 wrote to memory of 4724 3316 {8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe 89 PID 2572 wrote to memory of 3624 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 93 PID 2572 wrote to memory of 3624 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 93 PID 2572 wrote to memory of 3624 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 93 PID 2572 wrote to memory of 224 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 94 PID 2572 wrote to memory of 224 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 94 PID 2572 wrote to memory of 224 2572 {32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe 94 PID 3624 wrote to memory of 768 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 97 PID 3624 wrote to memory of 768 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 97 PID 3624 wrote to memory of 768 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 97 PID 3624 wrote to memory of 3940 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 98 PID 3624 wrote to memory of 3940 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 98 PID 3624 wrote to memory of 3940 3624 {19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe 98 PID 768 wrote to memory of 4024 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 99 PID 768 wrote to memory of 4024 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 99 PID 768 wrote to memory of 4024 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 99 PID 768 wrote to memory of 1504 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 100 PID 768 wrote to memory of 1504 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 100 PID 768 wrote to memory of 1504 768 {B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe 100 PID 4024 wrote to memory of 4836 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 101 PID 4024 wrote to memory of 4836 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 101 PID 4024 wrote to memory of 4836 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 101 PID 4024 wrote to memory of 3708 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 102 PID 4024 wrote to memory of 3708 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 102 PID 4024 wrote to memory of 3708 4024 {F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe 102 PID 4836 wrote to memory of 4360 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 103 PID 4836 wrote to memory of 4360 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 103 PID 4836 wrote to memory of 4360 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 103 PID 4836 wrote to memory of 4356 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 104 PID 4836 wrote to memory of 4356 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 104 PID 4836 wrote to memory of 4356 4836 {140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe 104 PID 4360 wrote to memory of 704 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 105 PID 4360 wrote to memory of 704 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 105 PID 4360 wrote to memory of 704 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 105 PID 4360 wrote to memory of 3264 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 106 PID 4360 wrote to memory of 3264 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 106 PID 4360 wrote to memory of 3264 4360 {7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe 106 PID 704 wrote to memory of 1828 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 107 PID 704 wrote to memory of 1828 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 107 PID 704 wrote to memory of 1828 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 107 PID 704 wrote to memory of 752 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 108 PID 704 wrote to memory of 752 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 108 PID 704 wrote to memory of 752 704 {A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe 108 PID 1828 wrote to memory of 5016 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 109 PID 1828 wrote to memory of 5016 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 109 PID 1828 wrote to memory of 5016 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 109 PID 1828 wrote to memory of 1712 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 110 PID 1828 wrote to memory of 1712 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 110 PID 1828 wrote to memory of 1712 1828 {B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe 110 PID 5016 wrote to memory of 1444 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe 111 PID 5016 wrote to memory of 1444 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe 111 PID 5016 wrote to memory of 1444 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe 111 PID 5016 wrote to memory of 4252 5016 {277D873B-35B1-4d42-8A52-C9F8E7978348}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_8b11e32b06c58c5023dc6d550d0b8036_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\{8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exeC:\Windows\{8A19F290-0A10-4829-B0AF-D95A42E32D8A}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exeC:\Windows\{32DD4380-A5CD-4cd9-BF9A-4F3867C66A76}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exeC:\Windows\{19DA1C00-5928-4d7c-A77B-62D44FC9EB78}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exeC:\Windows\{B221812D-A5EE-4d24-AF36-16DA2F57CDF5}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exeC:\Windows\{F4523BEB-ABB6-4605-ADC8-4A0E8AFD15A8}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exeC:\Windows\{140FC3CC-8D9B-4a4d-B690-359D65D4D96A}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exeC:\Windows\{7681B9EC-201D-45a7-8E3A-A0C7DC6A55DB}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\{A23CF3DC-D257-4aac-80AE-50795201A3A9}.exeC:\Windows\{A23CF3DC-D257-4aac-80AE-50795201A3A9}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\{B7B6B101-0800-44e7-83EE-4E8C934291E8}.exeC:\Windows\{B7B6B101-0800-44e7-83EE-4E8C934291E8}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\{277D873B-35B1-4d42-8A52-C9F8E7978348}.exeC:\Windows\{277D873B-35B1-4d42-8A52-C9F8E7978348}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\{B14D94F5-5AD6-4ba5-B540-7672A158E480}.exeC:\Windows\{B14D94F5-5AD6-4ba5-B540-7672A158E480}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1444 -
C:\Windows\{D00A1302-98AE-48b8-905A-72DF337DD993}.exeC:\Windows\{D00A1302-98AE-48b8-905A-72DF337DD993}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B14D9~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{277D8~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B7B6B~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A23CF~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7681B~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{140FC~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4523~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2218~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{19DA1~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{32DD4~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8A19F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5b2ff4012995d6f2269db4a525c59d771
SHA1b37da999022416d229e539e68f7a29d243ce7d72
SHA25680bd925ce1bfb2a0502898e8b0e7843fc406c0ad35c30e51960685848a447f85
SHA5121f14c7d3abd59b5e274a2a3c5a8098803b5e8340a910f37edd05ba2c5d9c30a1e12fc6ccf4fd965eee8b17fe4883339e270450dca6e5f3823c18d20d8de13e9c
-
Filesize
372KB
MD58ea96ed790bd7b42f8877ee505526994
SHA17552135e9ad01d0f5dd0ca2ac4aeaaf9b25c8cd9
SHA256e10be677f8239ce074d16e02737d55952017408a354dc77b99e54d7ea4157a0e
SHA51259df43f47c663b4e286fa0c9873221eb608230eaaf8526431cff2009ea8854699e6fcec9d7825ad6d9c9ed7167916b77bf54a5750d02c612f3a1dce66f742c09
-
Filesize
372KB
MD5d39a798e4a18e4df753608757d7d94c2
SHA1648c26af3cd25e27115e80634a402f5a2b82770c
SHA2569510aec78a2837dd64ea1b947fb36bbff106b29b1f8e5662952ae77ba262741e
SHA512e4ad960a8c041416c792b895c29ccf35c5ce779b53ca8eb1e45f97fdfc294cce15fd8609d288ffc822d7f1d6f171f5e413a0a82200cc7b0194140130acc5c336
-
Filesize
372KB
MD56b466d0e71d288bc31e19aed9b717cf5
SHA1553534c5798d11199ca0672f6e5e8ae06dcc4456
SHA256b310f1e73dcf1b233e4f62e7a8d7af58219896682dd03ca0bae9deb9caa152f9
SHA512dcb20152fac7cc53b9024a8cff9008cf029d8f62ac530e7490e3753726920e337a583ed7ed48ca03c9852de9d5e5df7164e7547e9167647b86f5bef6405e1b9d
-
Filesize
372KB
MD5a11bff070f68591d82350fb974a93301
SHA145d34e69cf03a50740b8ed6d3c3897c99afb548b
SHA256ee1ceb992453aa6e87a0234f0ebdd9321fdb4a689c5059b32e9a379e1539b4d0
SHA5129fe971ceaf1edcdd7d73bc6b9f6ba1b0f65376e718a03aff9e8a86287c20a591ad656ddff7f2ed5515aba583261f5a65974108985e76ecb5fe35385179022bb2
-
Filesize
372KB
MD518b67e6abdb04c3b71b3bf7518a8ec94
SHA1c8344176effa8f489d8cef5092f043dd10be46c4
SHA256fdd922ce3a7904ac89bc266ab0673d1c3daf06c100f4ed110dcd108749d4800c
SHA51285bfdf833489a4ac518d08768745b77f4268940186f217ca0e9f058564b81c273b6fdd382bde5c39255d99ddfc0851435ab00e476127f3c027a897011645c2f0
-
Filesize
372KB
MD51f755b7be822dd845116996e3251ce55
SHA140d14c227f55881fe2302e5c58e8557e2c608550
SHA2563dce289dabb2de595cc8aed401f0768358457e0c25aed4f336533e54f032f3d7
SHA5121ff8978c269c0738f66dfe34e3b38c053d6bc723340ece05c327cb5b7a5186f1f01a5f2b849801fc40330f794d92120dcfbb7577402c4f75b17afef405974315
-
Filesize
372KB
MD5c7f4c928be08576cd583dd4517c86c17
SHA15ef12025c721fc05c8e4a363702af35e9aa6df8e
SHA2562a1e258e7a82e587e2b52f366f7abb70cc0a7e02f772a490abb2a194cdb3237d
SHA5123286504e9a9800781b8756649215ab8eb147e2d443278d7bf93a5aefd9d2cdeeb49188c3d43ce10ebac3e92864170e42fac599c3029f080fda330c35f88ac7ce
-
Filesize
372KB
MD50c9a48fe65500f5a59bbc8deb85d59b5
SHA1eef7e7a0084417018a01f696be6b1babd614fbb7
SHA2568bdaa1343ec8e102f6052c163669f61b0e6ac477ab70820608fdba27d8e19f42
SHA512f4fc2380379d8785fb511301cc1d89cf0886cd60e7a3346d56f199c4910b4ff65bdc2bfc9c54dbf419ef2c1bcb03dee9a4149ded7fd4b22505c861e5ba2573c1
-
Filesize
372KB
MD5808f68733a2fc85992746ad2c19dfa36
SHA1a340d9252a7ad57eab5699f8dcbe81753b61fbed
SHA25644a88ff69b4e0ccbd28a79758ba85230c0e90369eb30888aaeea24a08b397b11
SHA51219cccd9602049be2b1a15b7d1fee14aef16c1bd3354156d03853c42c8c3f6f61fa9412028f2f76e8d03e313313d8887d0ef01eb6ff341ea02d679d3ae3977369
-
Filesize
372KB
MD5561518ad83af4523f8e88d075751280d
SHA1034e55576aebcac8ed6a1f5145821946302527e9
SHA2567af3c696e0d06c3a13101eeec00649ea880356002594f0eb1ab6e4ed6baf4371
SHA512d219c59b43016b553f4ab9aebdc0f1e15cfcb8de699c9dfa9bb2c6844d8bc83010c10df0dcf6e38316f5b4f39d4e8b3fb8b8f1e0fefbaf2fe99f4a2c4efccde0
-
Filesize
372KB
MD5299d1780e5b2bc1945ebe6d61816efa6
SHA1a0f86bf3a12c3b7468968cc01856d5e42f5cc8c4
SHA2563ac64b351fc360e15ef2e7d84c37779ec31cffa3932b535ea799ee73bd0943a8
SHA512ddaa8df20a8d77667623d36e63163e50f961ed9627a4ba011bdd661663c36064eb5095b7b8bfc5e02c866350ec7ef8ec919fddac3dd0245630cfcaa5ad07add4