Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe
-
Size
192KB
-
MD5
e05a4709520074f18c63fe96c5b8db31
-
SHA1
76e3de89f7640038f909ab7597d373e02032f158
-
SHA256
bde35e900bdb9a168941fdb113b07115012f27765e9f995bf7d868823d115e8c
-
SHA512
3d476ba16c768c1f5c3599c74b83a5e9da8ec033618df2f2b2c60bd5a0115304c6e2f33b763878ef07385fac4ffb9f15599724721b84e6ede07acb5b3c874a0b
-
SSDEEP
1536:1EGh0oXl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oXl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290} {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0} {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA3869D4-AE11-40e5-85EA-54BD70458715} {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0694AA2C-8279-4882-8626-AD1E510BD3D1} 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F}\stubpath = "C:\\Windows\\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe" {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CD0229-6E5F-4b7d-8637-6E65ABD57313}\stubpath = "C:\\Windows\\{16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe" {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F} {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}\stubpath = "C:\\Windows\\{7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe" {60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E626BEEB-DF98-41ba-AA9F-D491169DDB27} {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E626BEEB-DF98-41ba-AA9F-D491169DDB27}\stubpath = "C:\\Windows\\{E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe" {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}\stubpath = "C:\\Windows\\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe" {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0694AA2C-8279-4882-8626-AD1E510BD3D1}\stubpath = "C:\\Windows\\{0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe" 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8A120AD-4B5E-42e7-ABEE-830678F20698}\stubpath = "C:\\Windows\\{F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe" {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB} {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AF29301-4A8E-471d-A26A-83DD03A66AA1}\stubpath = "C:\\Windows\\{1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe" {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}\stubpath = "C:\\Windows\\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe" {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16CD0229-6E5F-4b7d-8637-6E65ABD57313} {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7C34CD92-0298-4b17-ACD7-9B3996B9F5D9} {60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60BA7F50-9F5E-43f8-854E-0205EA56A58B}\stubpath = "C:\\Windows\\{60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe" {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1AF29301-4A8E-471d-A26A-83DD03A66AA1} {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB}\stubpath = "C:\\Windows\\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe" {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA3869D4-AE11-40e5-85EA-54BD70458715}\stubpath = "C:\\Windows\\{FA3869D4-AE11-40e5-85EA-54BD70458715}.exe" {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F8A120AD-4B5E-42e7-ABEE-830678F20698} {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60BA7F50-9F5E-43f8-854E-0205EA56A58B} {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe -
Executes dropped EXE 11 IoCs
pid Process 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 620 {60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe 3552 {FA3869D4-AE11-40e5-85EA-54BD70458715}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe File created C:\Windows\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe File created C:\Windows\{FA3869D4-AE11-40e5-85EA-54BD70458715}.exe {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe File created C:\Windows\{0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe File created C:\Windows\{F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe File created C:\Windows\{E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe File created C:\Windows\{1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe File created C:\Windows\{16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe File created C:\Windows\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe File created C:\Windows\{60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe File created C:\Windows\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FA3869D4-AE11-40e5-85EA-54BD70458715}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe Token: SeIncBasePriorityPrivilege 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe Token: SeIncBasePriorityPrivilege 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe Token: SeIncBasePriorityPrivilege 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe Token: SeIncBasePriorityPrivilege 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe Token: SeIncBasePriorityPrivilege 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe Token: SeIncBasePriorityPrivilege 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe Token: SeIncBasePriorityPrivilege 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe Token: SeIncBasePriorityPrivilege 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe Token: SeIncBasePriorityPrivilege 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe Token: SeIncBasePriorityPrivilege 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2132 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 94 PID 2016 wrote to memory of 2132 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 94 PID 2016 wrote to memory of 2132 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 94 PID 2016 wrote to memory of 5040 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 95 PID 2016 wrote to memory of 5040 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 95 PID 2016 wrote to memory of 5040 2016 2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe 95 PID 2132 wrote to memory of 1672 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 96 PID 2132 wrote to memory of 1672 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 96 PID 2132 wrote to memory of 1672 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 96 PID 2132 wrote to memory of 2596 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 97 PID 2132 wrote to memory of 2596 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 97 PID 2132 wrote to memory of 2596 2132 {0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe 97 PID 1672 wrote to memory of 4172 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 101 PID 1672 wrote to memory of 4172 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 101 PID 1672 wrote to memory of 4172 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 101 PID 1672 wrote to memory of 4684 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 102 PID 1672 wrote to memory of 4684 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 102 PID 1672 wrote to memory of 4684 1672 {F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe 102 PID 4172 wrote to memory of 1460 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 103 PID 4172 wrote to memory of 1460 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 103 PID 4172 wrote to memory of 1460 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 103 PID 4172 wrote to memory of 2904 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 104 PID 4172 wrote to memory of 2904 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 104 PID 4172 wrote to memory of 2904 4172 {16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe 104 PID 1460 wrote to memory of 620 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 105 PID 1460 wrote to memory of 620 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 105 PID 1460 wrote to memory of 620 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 105 PID 1460 wrote to memory of 4332 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 106 PID 1460 wrote to memory of 4332 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 106 PID 1460 wrote to memory of 4332 1460 {2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe 106 PID 4696 wrote to memory of 4444 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 110 PID 4696 wrote to memory of 4444 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 110 PID 4696 wrote to memory of 4444 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 110 PID 4696 wrote to memory of 1828 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 111 PID 4696 wrote to memory of 1828 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 111 PID 4696 wrote to memory of 1828 4696 {7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe 111 PID 4444 wrote to memory of 4528 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 116 PID 4444 wrote to memory of 4528 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 116 PID 4444 wrote to memory of 4528 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 116 PID 4444 wrote to memory of 1480 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 117 PID 4444 wrote to memory of 1480 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 117 PID 4444 wrote to memory of 1480 4444 {E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe 117 PID 4528 wrote to memory of 220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 122 PID 4528 wrote to memory of 220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 122 PID 4528 wrote to memory of 220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 122 PID 4528 wrote to memory of 4220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 123 PID 4528 wrote to memory of 4220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 123 PID 4528 wrote to memory of 4220 4528 {1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe 123 PID 220 wrote to memory of 5108 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 124 PID 220 wrote to memory of 5108 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 124 PID 220 wrote to memory of 5108 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 124 PID 220 wrote to memory of 4416 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 125 PID 220 wrote to memory of 4416 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 125 PID 220 wrote to memory of 4416 220 {9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe 125 PID 5108 wrote to memory of 4516 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 126 PID 5108 wrote to memory of 4516 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 126 PID 5108 wrote to memory of 4516 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 126 PID 5108 wrote to memory of 3976 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 127 PID 5108 wrote to memory of 3976 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 127 PID 5108 wrote to memory of 3976 5108 {89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe 127 PID 4516 wrote to memory of 3552 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe 131 PID 4516 wrote to memory of 3552 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe 131 PID 4516 wrote to memory of 3552 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe 131 PID 4516 wrote to memory of 4412 4516 {BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_e05a4709520074f18c63fe96c5b8db31_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{0694AA2C-8279-4882-8626-AD1E510BD3D1}.exeC:\Windows\{0694AA2C-8279-4882-8626-AD1E510BD3D1}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\{F8A120AD-4B5E-42e7-ABEE-830678F20698}.exeC:\Windows\{F8A120AD-4B5E-42e7-ABEE-830678F20698}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\{16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exeC:\Windows\{16CD0229-6E5F-4b7d-8637-6E65ABD57313}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exeC:\Windows\{2AF4FCFE-B508-4198-AA7D-255B67D73C8F}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\{60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exeC:\Windows\{60BA7F50-9F5E-43f8-854E-0205EA56A58B}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\{7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exeC:\Windows\{7C34CD92-0298-4b17-ACD7-9B3996B9F5D9}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\{E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exeC:\Windows\{E626BEEB-DF98-41ba-AA9F-D491169DDB27}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\{1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exeC:\Windows\{1AF29301-4A8E-471d-A26A-83DD03A66AA1}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exeC:\Windows\{9B4CB960-70B0-4cba-BAB0-F9ECB39EE290}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exeC:\Windows\{89E76391-D8B2-4ed8-836A-1EA5F8DA7FB0}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exeC:\Windows\{BD74ECD4-C91D-4fc2-8477-56BF10A492CB}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\{FA3869D4-AE11-40e5-85EA-54BD70458715}.exeC:\Windows\{FA3869D4-AE11-40e5-85EA-54BD70458715}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BD74E~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{89E76~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9B4CB~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1AF29~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E626B~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C34C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60BA7~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2AF4F~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:4332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{16CD0~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F8A12~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0694A~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:5040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5dbcfd72fb0d0dda6d71fa5a0337d970e
SHA1125d523d5df153a0a7578ee2fa277b844aebeeeb
SHA256e2abc4f52e8efad4ff5a9f4f841d9444e6c5351d64c47f449b8fdce81c401ac7
SHA51206cf41c1609733a1122a57da5e6192dfa07a5f8934713d0d306e2d9e94a01b008f5091d4bd82b7aff16f8dcf5e9b616ff729063d05cd7757aeabc52898463481
-
Filesize
192KB
MD52c28b932324b4fa2e17a78147b710002
SHA1ed87db8c394aa4f9b7393ecc3826f7030ba26d65
SHA256f1b14336e1a2fc245382e02146eb774691a310bb0ab18a7117c48728b94adb1d
SHA512c24a55e455e025e988a04e7fd45fc1dce31b3995e4e60723e9d0fd6fcdd6cdac692a2207fafe8589b84c1980bfb005d63101cfcbf3209a3a2d6305d587f5247d
-
Filesize
192KB
MD5ed0080c25c3985a18cb7bc9d2e917c59
SHA11529ba5637b675d24334577d7af53cdf5109ad1b
SHA2562f3dc684392a86615def47b3dbd2c75c9fcb1ca9e2a4171d93625388fd3ad585
SHA51265a1d799b0bc5f00e58b7996532739bfec8b5157ffcb204d4e169a848335cc1a8ab38ed6f8eb532af2509c81d2fa186559fbbfa3e9a5e3a3b0275f7ca3192853
-
Filesize
192KB
MD50770efd1138f72a1c2175c04a448a677
SHA18edd0ffa8a524e9c911b66bc93094ed6eecfe562
SHA2569252c4d7b7631c5a105ea0e677b5859914532f413f0e5f863c676b772778c9b2
SHA51236883bbdf1e29647ee0589465c19fa9b168f62cd98e5ef98f479a84fe21054d785a3f7454a46602569441b4b6d9ddfb94ce24d274e6bdd555c7cfca378957d29
-
Filesize
192KB
MD590660c1dfd053cb355533d4d4d604744
SHA148f8c2878204b0b2b7cc52c881827e4b8b35b2c1
SHA2568f59a88d7b3ee1b2c2f8c7fbeefc9af72edf8e1df1473bb44e4ded5de8d4e1f6
SHA5122284a6d6762ac672502a5a46f432add39e80c263dfec897955d8692e05c1fba9d587bced379d47105928375c3071ed605c052ddb3ee93f71fcedcc95bd4c4df7
-
Filesize
192KB
MD50d1d7a5770c8c1fb1bfeea6761247cb8
SHA1f1a6a6bde6707546fe2c812b0b67c5ce36ee4202
SHA256efad32ad668cb9fe57cf86f0ac1181fe36631d8bd30a04c3ebe00faf15e87789
SHA5121258bd619fdc8788ccbbd3420848cbdcdeb56642e39a36e4b3d96f4d0cbbe82bda957f4ed631884300fd2fc45a7dae29384a62dd0b2eec7e9a7d5902edde541b
-
Filesize
192KB
MD5346ade6286f86336227cb614f1baf042
SHA187f01a5505260f819c95912b2de26fad8c2a644c
SHA25641db3f4f5a3c35a0d3808eae81187230136201dc7a31a695279a113d5582d38e
SHA512761c61d35201a756cefa5f0e9b8969c6341e7f977266139fd8d1354f5735d7df5320f1d3d7e865a43cda5504339861b236846f50fa122a8d3870d7e779f9ba1a
-
Filesize
192KB
MD54c2b247e08a6ecc03101441582c0f32a
SHA1d70763ddb9613c977502a0d9acfe66e02bd30039
SHA2564da098a0bba7a8afa5fc2761d2f3ca1612db6964278b02e034cddf661312aeef
SHA512f14a9b9c4ccaa15e59aef8b8b201ecb3feb08ee36937df1e09402fa2228dc2407e18acb6c8279d74fb41e1f4b7f0a68576d3ffcc03f927080d585d51fcf5e563
-
Filesize
192KB
MD5c97a977733cc451ad3a73c4b404a46a6
SHA1ea3647abc1b8ae231857aaab9c9323e1522e2aa1
SHA2560199a18be88f4da9e9b1d9abc47ada397f86ab8bb958c33e6899db5ba17249d5
SHA512da5658a6e7cd98d90036c06bc670bec33a6e549d93566bada7c49025737d4dba5ee60cc874d9ae524cd978b6b723ccfcba2b8d82fd4abf682c329e8cc85b6e94
-
Filesize
192KB
MD5125db3f515a037e8b58b7bd5fdb38a7e
SHA1afc5ca96a3379bd57ae760a2cee69429cece2fa4
SHA2569a46cbfc23dfb83be570a901465aaa931ba525c6a1fffcd0ac7c231687171ad9
SHA512d7987d827bf10a8cf5b6a9c8c881cedbcec7560a0fb9bf57af652c4fb8b3d925657a73de35766f0428275c32bd970a6c40ddcc95cda3374ec120d3a1b41f597c
-
Filesize
192KB
MD5fc03d06920458c48a673441e54581554
SHA14e9783e4dd4264f8a520703053a945a76302b7f1
SHA25625af7e45f5e1e1ab232f02360dcebb8565721671de6e90db28cb6261bc400a88
SHA51273594b1a1b8cf27946d94e1fa3fcc236468453fd2245dc497fd01d7e0d24f12bdf11e4249f569e34aec3b86e4640c9ed8d6b169661a86132627161f69f52f23d