Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe
-
Size
180KB
-
MD5
bf07cf2a1768af0ea1152f6d8e260b6b
-
SHA1
3f50f17815b05a21ffa0099c80152cb37bee7565
-
SHA256
f06872d98c4dfe708262a92a30c04aeea71f81abed05ae16a20514eba05ecfda
-
SHA512
600a466f5167e1f2c002c3f9d53a27b88c3a2f047ed3bd8ea8fb7af45bb0e4ccf7434fbff744994070da87f1581eca8576a2928a9bacefdad08f45a29a721bed
-
SSDEEP
3072:jEGh0oxlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGHl5eKcAEc
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBA2B895-4D64-4c66-A878-298E00BD8D44}\stubpath = "C:\\Windows\\{EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe" {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81}\stubpath = "C:\\Windows\\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe" 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{928C5BE2-F70C-4d85-9CA3-4EE051664C08} {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{928C5BE2-F70C-4d85-9CA3-4EE051664C08}\stubpath = "C:\\Windows\\{928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe" {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66} {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}\stubpath = "C:\\Windows\\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe" {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305} {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}\stubpath = "C:\\Windows\\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe" {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6} {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}\stubpath = "C:\\Windows\\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe" {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E46F1757-1290-465b-88AC-3364B248F4DF}\stubpath = "C:\\Windows\\{E46F1757-1290-465b-88AC-3364B248F4DF}.exe" {6E49E744-B57B-4739-A065-2DC2D696E936}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E770883A-A7F4-4957-BD36-A603063CEA5F} {E46F1757-1290-465b-88AC-3364B248F4DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6176175-8868-4d5a-8D7A-CFACFD425358} {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}\stubpath = "C:\\Windows\\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe" {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E49E744-B57B-4739-A065-2DC2D696E936} {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6E49E744-B57B-4739-A065-2DC2D696E936}\stubpath = "C:\\Windows\\{6E49E744-B57B-4739-A065-2DC2D696E936}.exe" {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E46F1757-1290-465b-88AC-3364B248F4DF} {6E49E744-B57B-4739-A065-2DC2D696E936}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81} 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6176175-8868-4d5a-8D7A-CFACFD425358}\stubpath = "C:\\Windows\\{B6176175-8868-4d5a-8D7A-CFACFD425358}.exe" {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC} {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E770883A-A7F4-4957-BD36-A603063CEA5F}\stubpath = "C:\\Windows\\{E770883A-A7F4-4957-BD36-A603063CEA5F}.exe" {E46F1757-1290-465b-88AC-3364B248F4DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EBA2B895-4D64-4c66-A878-298E00BD8D44} {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe -
Deletes itself 1 IoCs
pid Process 2008 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 2940 {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe 2248 {6E49E744-B57B-4739-A065-2DC2D696E936}.exe 1984 {E46F1757-1290-465b-88AC-3364B248F4DF}.exe 1132 {E770883A-A7F4-4957-BD36-A603063CEA5F}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{B6176175-8868-4d5a-8D7A-CFACFD425358}.exe {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe File created C:\Windows\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe File created C:\Windows\{E46F1757-1290-465b-88AC-3364B248F4DF}.exe {6E49E744-B57B-4739-A065-2DC2D696E936}.exe File created C:\Windows\{E770883A-A7F4-4957-BD36-A603063CEA5F}.exe {E46F1757-1290-465b-88AC-3364B248F4DF}.exe File created C:\Windows\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe File created C:\Windows\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe File created C:\Windows\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe File created C:\Windows\{EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe File created C:\Windows\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe File created C:\Windows\{6E49E744-B57B-4739-A065-2DC2D696E936}.exe {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe File created C:\Windows\{928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E46F1757-1290-465b-88AC-3364B248F4DF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E770883A-A7F4-4957-BD36-A603063CEA5F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6E49E744-B57B-4739-A065-2DC2D696E936}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe Token: SeIncBasePriorityPrivilege 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe Token: SeIncBasePriorityPrivilege 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe Token: SeIncBasePriorityPrivilege 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe Token: SeIncBasePriorityPrivilege 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe Token: SeIncBasePriorityPrivilege 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe Token: SeIncBasePriorityPrivilege 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe Token: SeIncBasePriorityPrivilege 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe Token: SeIncBasePriorityPrivilege 2940 {7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe Token: SeIncBasePriorityPrivilege 2248 {6E49E744-B57B-4739-A065-2DC2D696E936}.exe Token: SeIncBasePriorityPrivilege 1984 {E46F1757-1290-465b-88AC-3364B248F4DF}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2612 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 31 PID 2652 wrote to memory of 2612 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 31 PID 2652 wrote to memory of 2612 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 31 PID 2652 wrote to memory of 2612 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 31 PID 2652 wrote to memory of 2008 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 32 PID 2652 wrote to memory of 2008 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 32 PID 2652 wrote to memory of 2008 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 32 PID 2652 wrote to memory of 2008 2652 2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe 32 PID 2612 wrote to memory of 2804 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 33 PID 2612 wrote to memory of 2804 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 33 PID 2612 wrote to memory of 2804 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 33 PID 2612 wrote to memory of 2804 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 33 PID 2612 wrote to memory of 2884 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 34 PID 2612 wrote to memory of 2884 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 34 PID 2612 wrote to memory of 2884 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 34 PID 2612 wrote to memory of 2884 2612 {C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe 34 PID 2804 wrote to memory of 2684 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 35 PID 2804 wrote to memory of 2684 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 35 PID 2804 wrote to memory of 2684 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 35 PID 2804 wrote to memory of 2684 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 35 PID 2804 wrote to memory of 2792 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 36 PID 2804 wrote to memory of 2792 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 36 PID 2804 wrote to memory of 2792 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 36 PID 2804 wrote to memory of 2792 2804 {928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe 36 PID 2684 wrote to memory of 2812 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 37 PID 2684 wrote to memory of 2812 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 37 PID 2684 wrote to memory of 2812 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 37 PID 2684 wrote to memory of 2812 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 37 PID 2684 wrote to memory of 2872 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 38 PID 2684 wrote to memory of 2872 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 38 PID 2684 wrote to memory of 2872 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 38 PID 2684 wrote to memory of 2872 2684 {B6176175-8868-4d5a-8D7A-CFACFD425358}.exe 38 PID 2812 wrote to memory of 2012 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 39 PID 2812 wrote to memory of 2012 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 39 PID 2812 wrote to memory of 2012 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 39 PID 2812 wrote to memory of 2012 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 39 PID 2812 wrote to memory of 2296 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 40 PID 2812 wrote to memory of 2296 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 40 PID 2812 wrote to memory of 2296 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 40 PID 2812 wrote to memory of 2296 2812 {59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe 40 PID 2012 wrote to memory of 3032 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 41 PID 2012 wrote to memory of 3032 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 41 PID 2012 wrote to memory of 3032 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 41 PID 2012 wrote to memory of 3032 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 41 PID 2012 wrote to memory of 1652 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 42 PID 2012 wrote to memory of 1652 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 42 PID 2012 wrote to memory of 1652 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 42 PID 2012 wrote to memory of 1652 2012 {7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe 42 PID 3032 wrote to memory of 3056 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 43 PID 3032 wrote to memory of 3056 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 43 PID 3032 wrote to memory of 3056 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 43 PID 3032 wrote to memory of 3056 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 43 PID 3032 wrote to memory of 2664 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 44 PID 3032 wrote to memory of 2664 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 44 PID 3032 wrote to memory of 2664 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 44 PID 3032 wrote to memory of 2664 3032 {C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe 44 PID 3056 wrote to memory of 2940 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 45 PID 3056 wrote to memory of 2940 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 45 PID 3056 wrote to memory of 2940 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 45 PID 3056 wrote to memory of 2940 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 45 PID 3056 wrote to memory of 2476 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 46 PID 3056 wrote to memory of 2476 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 46 PID 3056 wrote to memory of 2476 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 46 PID 3056 wrote to memory of 2476 3056 {EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_bf07cf2a1768af0ea1152f6d8e260b6b_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exeC:\Windows\{C0FA3149-63D5-4acc-9CA3-497B3BD24B81}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\{928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exeC:\Windows\{928C5BE2-F70C-4d85-9CA3-4EE051664C08}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\{B6176175-8868-4d5a-8D7A-CFACFD425358}.exeC:\Windows\{B6176175-8868-4d5a-8D7A-CFACFD425358}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exeC:\Windows\{59B4851C-1E45-4e4e-B2A2-36D0EFF4BB66}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exeC:\Windows\{7CEBD854-B7F4-4b9b-BFE0-B75DC9AC1305}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exeC:\Windows\{C2526628-BCEB-49ab-A4C4-DE7D9B2698CC}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\{EBA2B895-4D64-4c66-A878-298E00BD8D44}.exeC:\Windows\{EBA2B895-4D64-4c66-A878-298E00BD8D44}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exeC:\Windows\{7E8A54E3-2F70-42f1-9DDA-7BB729450EC6}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\{6E49E744-B57B-4739-A065-2DC2D696E936}.exeC:\Windows\{6E49E744-B57B-4739-A065-2DC2D696E936}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\{E46F1757-1290-465b-88AC-3364B248F4DF}.exeC:\Windows\{E46F1757-1290-465b-88AC-3364B248F4DF}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\{E770883A-A7F4-4957-BD36-A603063CEA5F}.exeC:\Windows\{E770883A-A7F4-4957-BD36-A603063CEA5F}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E46F1~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6E49E~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7E8A5~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBA2B~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2526~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7CEBD~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59B48~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6176~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{928C5~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C0FA3~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5e4283a89b8353a0b8ad1e1586df36209
SHA139ed9af0cd0af642071a8b23f3a7e93ef4d63395
SHA256f94970724dac8ecb31df89e9bf528c9daded032ab458d17fe2f1cbd2a65d9bdc
SHA51222bf91ea1ca25d934ca38a4049796cf82dc69744a30a2795e57cb95fa1d8ca73f4c182903fbda484804bf844e48a0ff4b78f80190760558410eb38ec339f9fe8
-
Filesize
180KB
MD56b751d37654163e01ec8329eb8f72423
SHA1b5d91c9520b2a84d46f990e115493b967fa157a3
SHA256ed4c8a0498fc4e31795c98e378bbcdf6bd827dfe3e2013d53d56c11458b08e6d
SHA51249d2de9fa8d3f983635b4a040a0b286bcedd527efda09abbbde306277bcb2837dec2c83d05949db1bccd830bf9c2ea425a1c2d5031b54a07a44acbfb19bbe8c9
-
Filesize
180KB
MD542f55b6fc40ed716e055bab4dec87519
SHA1d2d39c5d00d495ea5b0eafd62a14a0766146a90c
SHA256bca035134cbd4af88906015736d9647aad54fecfb8416f4c6424d8f3c5d7bd38
SHA5129742a8668de718e7894ccad049ab8f79a334085a843614c44885c47e97843e9a1bba7a4059dc3a9c019eaa19216d45ab95173f31d82e09cb7fb253bd70039102
-
Filesize
180KB
MD56d3643a8a3efe50a68b11f4b544b7f89
SHA141207e8e365bbc3d2d58f34f4a8861e9a9446d69
SHA256e1dd9e11ea21c7da314a0774966db72d013fca2d7e4721bde5a96c282c929223
SHA512bb54c87fd37c5b99d1dbd4d85eb52cac7d0f3123d4524fb265d028927740248c539b41dd0bce9f2005f5cfcdb2483c06839539ad39236b269aab1b95810eefda
-
Filesize
180KB
MD5f9de4a772350aa7e6d9a14d20a82827f
SHA19b4247f7db0dd830719c8bff1690e6bd3b7ad54c
SHA25686753489129999fc394443d1d367df76982c2476003d9f959036570b201945e5
SHA5122f913e46a7b03363e105efdbebf3a2b1598e202c1a636503ba6593bce66148cae4e8fcf6da61551bb21b690f9405695cdd9003ccaf8e78460be78b422af330f9
-
Filesize
180KB
MD5c4d15d9edd853fd9e22ac70190ff26b8
SHA19659d74b314c00a58f8bf7d55da4f5aa81a5af92
SHA256011f31ca6e32705f19f5a2e30797313674c5fa4de53d66d114f282faa81fbff6
SHA512495129a72bc5895cd7fc3e337930cfc532d60a1196fdb09eec156e26d819939f23dc6522f00c3dd205d884264f3a2338c029280335cb9ec0d7db6a150fd2c633
-
Filesize
180KB
MD5916f92d043fa8f0747db330f15c60aad
SHA1c28b0b646056ebac6e5fe452b581799f2d1b2ff1
SHA256e06b2b0f9079593a7a42577f22c1ad3f905d00191766f3ffb6b0d01f6aefaa3b
SHA5121fd11af477f933f2be065cd141d639a40a2a614c244846538caaf6edbd39e929f3c79ad3fa0af836666a82e082f7c86cd7e5c62c941bbb1e5b71651d791e9847
-
Filesize
180KB
MD56e938a048474fd660a1b9a9f88c0bb61
SHA1b2b93324b507570bb465b903c3def7c1422478b7
SHA2560ec1b0464dcae9b10e8473cc014086bbd4e6e2ea8ee812899610278ea63c2586
SHA51290505367709b28f3868263e141528948082f23680dc56c6f73d90eb0803285f79dcb34b59337af6496715f9606a9746acbe6b9e141338a57179cc6611751695f
-
Filesize
180KB
MD56f6d6bd103a12ba920af072eea2cf71e
SHA110d128d5ac76ba36ae1648264a9238b93dd83b40
SHA2562d06d7f0ccb4252b37e686bf7ea0c625b951dcb0138b2e0581ce9571fd1db1a0
SHA5128770a6958eb8b2ebee3ddcd87f4544940720346da317ea9180b4b856495ba8e553b05b12910c3a6d9fd936067febb9812290449d0fc0128a89133b18a83362f1
-
Filesize
180KB
MD5d4a39035a189d5daf60e14e9430a1624
SHA1388e17677a77044f781429c944a85b87758fe463
SHA256b878e924fd1ce16ea2c3c4b1ca790528b339456167433739b3634ba2ffbc4fc0
SHA5129ee957d943f42d2beff4f1a9f45a9defed30ebedf8a77fab86f0e861df2ceb31d89d1c315572eff2a86e9beae21ef6fb2156d1f4cc4735e7d0ba2eff124c905e
-
Filesize
180KB
MD5b9646f76c181723edd20d438248edbf1
SHA155eb20bfe0b5aff86dcb7f8a108e246ce62a86d9
SHA2566988c8077f77e1329d479f8472c459d29f3e68367a9f8b25f756eab5bab81d81
SHA512249b1ea612a017fdedbb02e2346e3f2c0f83459c8c9e2259c3e870225f72479c5d71069ca7e96e32b70aed2579aac6fd2b836a8fa7fbabb85ae656806a1ba603