Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe
-
Size
344KB
-
MD5
426316c95b133a7d838ef64aba9491ea
-
SHA1
9f572e18549967acedf4fb3edb2059024a50d793
-
SHA256
4ccd2b8f150b501e556c8fb6a88414b5085d6e8b2686b52bfc188f6ea710c38e
-
SHA512
ad215540698474fec6d122d2c03f6142318f495a31b9c9d27558b3d93e7b0d7d674ea7ff90b3378e873e956d8de7efbf706efbb2196c186c599cc1a6bbad8042
-
SSDEEP
3072:mEGh0oIlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGGlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA} 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4} {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E} {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}\stubpath = "C:\\Windows\\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe" {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13} {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2910FD8-95AE-45ae-92EB-DCD5E5058589} {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}\stubpath = "C:\\Windows\\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe" {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A2910FD8-95AE-45ae-92EB-DCD5E5058589}\stubpath = "C:\\Windows\\{A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe" {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}\stubpath = "C:\\Windows\\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe" {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{28509B3B-5712-4912-8749-7831A45F52AC} {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{28509B3B-5712-4912-8749-7831A45F52AC}\stubpath = "C:\\Windows\\{28509B3B-5712-4912-8749-7831A45F52AC}.exe" {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5583BD04-84F4-4185-B11D-37AB6BEEB21E}\stubpath = "C:\\Windows\\{5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe" {28509B3B-5712-4912-8749-7831A45F52AC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827} {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC} {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D} {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}\stubpath = "C:\\Windows\\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe" 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5583BD04-84F4-4185-B11D-37AB6BEEB21E} {28509B3B-5712-4912-8749-7831A45F52AC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827}\stubpath = "C:\\Windows\\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe" {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58} {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}\stubpath = "C:\\Windows\\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exe" {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13}\stubpath = "C:\\Windows\\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe" {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}\stubpath = "C:\\Windows\\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe" {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe -
Deletes itself 1 IoCs
pid Process 2524 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 856 {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe 3052 {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe 2240 {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe 448 {1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe File created C:\Windows\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe File created C:\Windows\{5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe {28509B3B-5712-4912-8749-7831A45F52AC}.exe File created C:\Windows\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe File created C:\Windows\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe File created C:\Windows\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe File created C:\Windows\{28509B3B-5712-4912-8749-7831A45F52AC}.exe {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe File created C:\Windows\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe File created C:\Windows\{A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe File created C:\Windows\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe File created C:\Windows\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exe {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {28509B3B-5712-4912-8749-7831A45F52AC}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe Token: SeIncBasePriorityPrivilege 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe Token: SeIncBasePriorityPrivilege 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe Token: SeIncBasePriorityPrivilege 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe Token: SeIncBasePriorityPrivilege 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe Token: SeIncBasePriorityPrivilege 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe Token: SeIncBasePriorityPrivilege 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe Token: SeIncBasePriorityPrivilege 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe Token: SeIncBasePriorityPrivilege 856 {84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe Token: SeIncBasePriorityPrivilege 3052 {A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe Token: SeIncBasePriorityPrivilege 2240 {594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2528 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 31 PID 1712 wrote to memory of 2528 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 31 PID 1712 wrote to memory of 2528 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 31 PID 1712 wrote to memory of 2528 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 31 PID 1712 wrote to memory of 2524 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 32 PID 1712 wrote to memory of 2524 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 32 PID 1712 wrote to memory of 2524 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 32 PID 1712 wrote to memory of 2524 1712 2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe 32 PID 2528 wrote to memory of 2956 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 33 PID 2528 wrote to memory of 2956 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 33 PID 2528 wrote to memory of 2956 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 33 PID 2528 wrote to memory of 2956 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 33 PID 2528 wrote to memory of 3012 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 34 PID 2528 wrote to memory of 3012 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 34 PID 2528 wrote to memory of 3012 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 34 PID 2528 wrote to memory of 3012 2528 {30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe 34 PID 2956 wrote to memory of 2992 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 35 PID 2956 wrote to memory of 2992 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 35 PID 2956 wrote to memory of 2992 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 35 PID 2956 wrote to memory of 2992 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 35 PID 2956 wrote to memory of 2732 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 36 PID 2956 wrote to memory of 2732 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 36 PID 2956 wrote to memory of 2732 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 36 PID 2956 wrote to memory of 2732 2956 {5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe 36 PID 2992 wrote to memory of 2872 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 37 PID 2992 wrote to memory of 2872 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 37 PID 2992 wrote to memory of 2872 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 37 PID 2992 wrote to memory of 2872 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 37 PID 2992 wrote to memory of 2976 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 38 PID 2992 wrote to memory of 2976 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 38 PID 2992 wrote to memory of 2976 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 38 PID 2992 wrote to memory of 2976 2992 {837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe 38 PID 2872 wrote to memory of 2348 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 39 PID 2872 wrote to memory of 2348 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 39 PID 2872 wrote to memory of 2348 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 39 PID 2872 wrote to memory of 2348 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 39 PID 2872 wrote to memory of 2268 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 40 PID 2872 wrote to memory of 2268 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 40 PID 2872 wrote to memory of 2268 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 40 PID 2872 wrote to memory of 2268 2872 {28509B3B-5712-4912-8749-7831A45F52AC}.exe 40 PID 2348 wrote to memory of 752 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 41 PID 2348 wrote to memory of 752 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 41 PID 2348 wrote to memory of 752 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 41 PID 2348 wrote to memory of 752 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 41 PID 2348 wrote to memory of 2100 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 42 PID 2348 wrote to memory of 2100 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 42 PID 2348 wrote to memory of 2100 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 42 PID 2348 wrote to memory of 2100 2348 {5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe 42 PID 752 wrote to memory of 1784 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 43 PID 752 wrote to memory of 1784 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 43 PID 752 wrote to memory of 1784 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 43 PID 752 wrote to memory of 1784 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 43 PID 752 wrote to memory of 1900 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 44 PID 752 wrote to memory of 1900 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 44 PID 752 wrote to memory of 1900 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 44 PID 752 wrote to memory of 1900 752 {15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe 44 PID 1784 wrote to memory of 856 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 45 PID 1784 wrote to memory of 856 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 45 PID 1784 wrote to memory of 856 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 45 PID 1784 wrote to memory of 856 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 45 PID 1784 wrote to memory of 2032 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 46 PID 1784 wrote to memory of 2032 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 46 PID 1784 wrote to memory of 2032 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 46 PID 1784 wrote to memory of 2032 1784 {B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_426316c95b133a7d838ef64aba9491ea_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exeC:\Windows\{30C1F8D4-9E62-4cf5-A5B2-AC10DD6718BA}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exeC:\Windows\{5B41FAF5-3CAC-48f5-91F1-C1CCE81FD4C4}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exeC:\Windows\{837E2C07-CC57-42b1-B5F5-B6A5EB2E036E}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\{28509B3B-5712-4912-8749-7831A45F52AC}.exeC:\Windows\{28509B3B-5712-4912-8749-7831A45F52AC}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exeC:\Windows\{5583BD04-84F4-4185-B11D-37AB6BEEB21E}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exeC:\Windows\{15F580A3-F2A9-43bd-8C4A-8ABCE091F827}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exeC:\Windows\{B5FFDA7E-5124-4de5-BB0D-C8529F93BFAC}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exeC:\Windows\{84ACAB4C-1619-4391-AD1A-6BED9CB15B13}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\{A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exeC:\Windows\{A2910FD8-95AE-45ae-92EB-DCD5E5058589}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exeC:\Windows\{594DFCE9-9AE9-46e8-BD14-D9EC72C3DB58}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exeC:\Windows\{1304AB0C-13EF-4bf3-9E1B-8A1FB2BB663D}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{594DF~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A2910~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84ACA~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B5FFD~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{15F58~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5583B~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{28509~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{837E2~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5B41F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{30C1F~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD57a5152dac06408bfe9761b2cc1f430df
SHA10ad1f21de543158a899838d0877a56b1ba2f0e08
SHA2567cb21904584c5a4afc5d4932e42009f44c461db4bf4db4ecf5020c24455b187a
SHA5123daf542336b8d66f649a77dd47e8b103fc47da3b1f543c73920c82357a341df031210fa3cd987a32e560d4e5f0c06d7002d06fd3c199892bce2be77907ed84a5
-
Filesize
344KB
MD59f7a4829501be3439e66cb863d2a6427
SHA1ee4ef7286f22dadb4d087f20a31551d0ed7c56f8
SHA256323eee0eb11081edbdb88ce488cdcc8ece68e2427428d854b3d551f738bb306e
SHA512a54f2975b4281a85d5c1a6826b839daee10ec9f9832d23d3869de0ada29f0d3d227e4dc847f970a980d76a58789d18a20570b6dc174c5e2fc452fe1da70bcda9
-
Filesize
344KB
MD57a251d8ccfeef061d92dcef1d1dd60af
SHA1f77f8a066da0ef489c04904b3716ea00d40a4213
SHA256b2d7010ec5674bd1a6e25b9dd735d99b7958d2a33d036f5a2c1b84db56fda7c6
SHA5124fed94e8f72ffa2f08c53e55597c936e998a82731ebb0c76e51e05a6298394ea88839c4713d1dcbfe6247464af221e8ccdf24117e5b83d25e0916474d311b853
-
Filesize
344KB
MD539c25aebc2600fefa4352238bbed81b1
SHA1b2fbe2bee4e687d537de1d4c4dda7c66a818787b
SHA2560a838c4993af53a3da2c64e9c5ddb565d081568a1c54951001c36dc894989620
SHA51244ec51688b08be859fe7a6691e2acc9d66e67ba0712bc7e76ad551ddd65e37d99239eb78efe0ad75e02d6358cdda91e1558be75c6850d4c51e81028478e167de
-
Filesize
344KB
MD56c1bdf39e1a1860526f0d421ca9260f7
SHA152cfbcb2302836bdf820dd288539e34e6cb3be1d
SHA256563c66b82ba2668193d30e91b4e5d1e24cd0951762796a14469b8d64248f2237
SHA5129e949df0a2db9f0b75a2f04a1ce04e237bb2cab0535c31d4d756daa6034a67ac41c1fce82dabfde53f66c850e6b5dbebd0aad9d918c5561900162cce0736c273
-
Filesize
344KB
MD56618c8c045bc2d999c196d142a1583ed
SHA11eee6d2510fb01c39462866b8876fd70cfc3e832
SHA256ad4f59dc07f82fc44e8e56c82a453f0ba05030212df35c8d4a35a9555fedeb4b
SHA512691f10680d7ad4aa0080cbc39b18554273fbd7ebe6fb25fcdd981cbbf50abef62b7c7ff30e5c740e1d6bbf79b4324f7092f07a79eff42c987d21830c594bd6d3
-
Filesize
344KB
MD5c6b0c8f80373ddac0a96281d94fd823f
SHA1d333d41b70fe207cdec0fbba18868ff8f0db63d6
SHA256899906537757d0ae872035213ad6176d2f6ecb5f905339ec689f6b0a27e1ff75
SHA512f5a6f432418a920d680f64b63b7d4032c53c5cae4b9a2a6e73452d6dcb9b09abfe9d4c57d07d208bc2ad304ce39a104dcacca08a0c606e18619b402534b52caf
-
Filesize
344KB
MD5e7a996e9ce32da1411dc2780afb1b18f
SHA18d2619a71a0eec8955d66ffb2d728d83f347df15
SHA25687c68355ad81b29411ab8e947ecf6253b00faab0203c61c345d76d3587faf3cd
SHA512b37d31ee25bbd1149b6ec9ae5671160c53427c9110b289e5d302e94fce95ddfa3b2ed3d5aff66b55123a846398cdd85ff45eaa7c2b2b7b438d4d24a76e25c9d7
-
Filesize
344KB
MD52862524309108e98ab2188a9125b8f88
SHA147d2368573189ba7bde3e45de827260f4e2c4ba3
SHA2566c1d7fc16504b2f991d5b3ce23c8c5c0382ea783a3d7bc397b8888cb442fc995
SHA512b82b41f87551bdf73e799a793c646f4127adca628bd67570f3616e3e734587361e2ba5e52291ad224eaa95b4eaea7ff87eb861c209e5b18bc1069735e5c11f54
-
Filesize
344KB
MD5c28f5b1636aa45d4e8c234a66dde1038
SHA102fc3991289632b17aae7963359a426c6b619665
SHA2567473ea367741cbef0b6382494f5d733b3b2f2f478235bd22be6c3ae2fd5e5aeb
SHA51290b33e129a8d6d78db089e4ce4bfe6b775fb99b54eea880229f0299571aa5f1054af893a276030eefbe172a380b08e4d54962b250e00474b21e4badcea424523
-
Filesize
344KB
MD51f092f38a1f1784fb03c55c8ea837187
SHA162c40dfc1e0a9b301e46523db6c3b581fe3f0bc3
SHA256d9fc23049275718e611adfad1f2114b1a425c370b6ae63fd080b2f2d393d65cd
SHA512c1a0a66c5bdd9e7b58e19410dd2f79dede2053358c26b9b2a55a5573343cf6e36cc6467cb82bdbce15046db2e00bd9f1d2f2e6c4bb025c9de73d3b9750dd9061