Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe
-
Size
380KB
-
MD5
6aecb1c2e3c36a3d08bd9361ff812b81
-
SHA1
8f223813f6aca9593babe275709e32a108899ea3
-
SHA256
1820784312f5be24091b3b7c5c554438b7516929d5f190a520b0b6ad97d50aa8
-
SHA512
2de2b39f7f2f64d19770d342fba96210582bcc72c29df8ebf04ebfb3a1c38f672b9a6989279491ac82d09ad85a97683b8eef853db35008661121afc5d05364d0
-
SSDEEP
3072:mEGh0oUlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGml7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAB764FD-7F36-4903-A6CE-99AAB0361210}\stubpath = "C:\\Windows\\{CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe" 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43B00118-1400-4a93-9F94-4BDF094F917D} {3E722FBC-EABA-4020-B820-721AB1C93589}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA1A8614-C77F-4cae-930A-325D96EE0DFD}\stubpath = "C:\\Windows\\{BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe" {43B00118-1400-4a93-9F94-4BDF094F917D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6947693E-4A03-4bd0-AF88-846CB2D8A438}\stubpath = "C:\\Windows\\{6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe" {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}\stubpath = "C:\\Windows\\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exe" {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E722FBC-EABA-4020-B820-721AB1C93589}\stubpath = "C:\\Windows\\{3E722FBC-EABA-4020-B820-721AB1C93589}.exe" {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5} {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B} {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2} {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAB764FD-7F36-4903-A6CE-99AAB0361210} 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9806F003-C82C-4088-B2D3-7DF3ED5AB850}\stubpath = "C:\\Windows\\{9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe" {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}\stubpath = "C:\\Windows\\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe" {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}\stubpath = "C:\\Windows\\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe" {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399} {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}\stubpath = "C:\\Windows\\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe" {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9806F003-C82C-4088-B2D3-7DF3ED5AB850} {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E722FBC-EABA-4020-B820-721AB1C93589} {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{43B00118-1400-4a93-9F94-4BDF094F917D}\stubpath = "C:\\Windows\\{43B00118-1400-4a93-9F94-4BDF094F917D}.exe" {3E722FBC-EABA-4020-B820-721AB1C93589}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA1A8614-C77F-4cae-930A-325D96EE0DFD} {43B00118-1400-4a93-9F94-4BDF094F917D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9633FC1E-53D9-411f-916F-D2158AFBA481} {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9633FC1E-53D9-411f-916F-D2158AFBA481}\stubpath = "C:\\Windows\\{9633FC1E-53D9-411f-916F-D2158AFBA481}.exe" {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6947693E-4A03-4bd0-AF88-846CB2D8A438} {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe -
Deletes itself 1 IoCs
pid Process 2056 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 1760 {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe 1804 {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe 440 {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe 564 {ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\{CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe File created C:\Windows\{3E722FBC-EABA-4020-B820-721AB1C93589}.exe {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe File created C:\Windows\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe File created C:\Windows\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe File created C:\Windows\{6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe File created C:\Windows\{9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe File created C:\Windows\{43B00118-1400-4a93-9F94-4BDF094F917D}.exe {3E722FBC-EABA-4020-B820-721AB1C93589}.exe File created C:\Windows\{BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe {43B00118-1400-4a93-9F94-4BDF094F917D}.exe File created C:\Windows\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe File created C:\Windows\{9633FC1E-53D9-411f-916F-D2158AFBA481}.exe {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe File created C:\Windows\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exe {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3E722FBC-EABA-4020-B820-721AB1C93589}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {43B00118-1400-4a93-9F94-4BDF094F917D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe Token: SeIncBasePriorityPrivilege 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe Token: SeIncBasePriorityPrivilege 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe Token: SeIncBasePriorityPrivilege 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe Token: SeIncBasePriorityPrivilege 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe Token: SeIncBasePriorityPrivilege 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe Token: SeIncBasePriorityPrivilege 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe Token: SeIncBasePriorityPrivilege 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe Token: SeIncBasePriorityPrivilege 1760 {2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe Token: SeIncBasePriorityPrivilege 1804 {9633FC1E-53D9-411f-916F-D2158AFBA481}.exe Token: SeIncBasePriorityPrivilege 440 {6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2320 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 31 PID 1708 wrote to memory of 2320 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 31 PID 1708 wrote to memory of 2320 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 31 PID 1708 wrote to memory of 2320 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 31 PID 1708 wrote to memory of 2056 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 32 PID 1708 wrote to memory of 2056 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 32 PID 1708 wrote to memory of 2056 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 32 PID 1708 wrote to memory of 2056 1708 2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe 32 PID 2320 wrote to memory of 2120 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 33 PID 2320 wrote to memory of 2120 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 33 PID 2320 wrote to memory of 2120 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 33 PID 2320 wrote to memory of 2120 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 33 PID 2320 wrote to memory of 2852 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 34 PID 2320 wrote to memory of 2852 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 34 PID 2320 wrote to memory of 2852 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 34 PID 2320 wrote to memory of 2852 2320 {CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe 34 PID 2120 wrote to memory of 2708 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 35 PID 2120 wrote to memory of 2708 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 35 PID 2120 wrote to memory of 2708 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 35 PID 2120 wrote to memory of 2708 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 35 PID 2120 wrote to memory of 2808 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 36 PID 2120 wrote to memory of 2808 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 36 PID 2120 wrote to memory of 2808 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 36 PID 2120 wrote to memory of 2808 2120 {9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe 36 PID 2708 wrote to memory of 2740 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 37 PID 2708 wrote to memory of 2740 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 37 PID 2708 wrote to memory of 2740 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 37 PID 2708 wrote to memory of 2740 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 37 PID 2708 wrote to memory of 2856 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 38 PID 2708 wrote to memory of 2856 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 38 PID 2708 wrote to memory of 2856 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 38 PID 2708 wrote to memory of 2856 2708 {3E722FBC-EABA-4020-B820-721AB1C93589}.exe 38 PID 2740 wrote to memory of 3064 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 39 PID 2740 wrote to memory of 3064 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 39 PID 2740 wrote to memory of 3064 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 39 PID 2740 wrote to memory of 3064 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 39 PID 2740 wrote to memory of 3056 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 40 PID 2740 wrote to memory of 3056 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 40 PID 2740 wrote to memory of 3056 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 40 PID 2740 wrote to memory of 3056 2740 {43B00118-1400-4a93-9F94-4BDF094F917D}.exe 40 PID 3064 wrote to memory of 2868 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 41 PID 3064 wrote to memory of 2868 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 41 PID 3064 wrote to memory of 2868 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 41 PID 3064 wrote to memory of 2868 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 41 PID 3064 wrote to memory of 2912 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 42 PID 3064 wrote to memory of 2912 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 42 PID 3064 wrote to memory of 2912 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 42 PID 3064 wrote to memory of 2912 3064 {BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe 42 PID 2868 wrote to memory of 1056 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 44 PID 2868 wrote to memory of 1056 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 44 PID 2868 wrote to memory of 1056 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 44 PID 2868 wrote to memory of 1056 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 44 PID 2868 wrote to memory of 316 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 45 PID 2868 wrote to memory of 316 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 45 PID 2868 wrote to memory of 316 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 45 PID 2868 wrote to memory of 316 2868 {7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe 45 PID 1056 wrote to memory of 1760 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 46 PID 1056 wrote to memory of 1760 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 46 PID 1056 wrote to memory of 1760 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 46 PID 1056 wrote to memory of 1760 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 46 PID 1056 wrote to memory of 2436 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 47 PID 1056 wrote to memory of 2436 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 47 PID 1056 wrote to memory of 2436 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 47 PID 1056 wrote to memory of 2436 1056 {AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_6aecb1c2e3c36a3d08bd9361ff812b81_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\{CAB764FD-7F36-4903-A6CE-99AAB0361210}.exeC:\Windows\{CAB764FD-7F36-4903-A6CE-99AAB0361210}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\{9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exeC:\Windows\{9806F003-C82C-4088-B2D3-7DF3ED5AB850}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\{3E722FBC-EABA-4020-B820-721AB1C93589}.exeC:\Windows\{3E722FBC-EABA-4020-B820-721AB1C93589}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\{43B00118-1400-4a93-9F94-4BDF094F917D}.exeC:\Windows\{43B00118-1400-4a93-9F94-4BDF094F917D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\{BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exeC:\Windows\{BA1A8614-C77F-4cae-930A-325D96EE0DFD}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exeC:\Windows\{7274C4F5-94CE-4df2-AA66-BC7EDB3CC7A5}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exeC:\Windows\{AB5A7F8A-11E6-4ea9-B62E-4FE5877FB91B}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exeC:\Windows\{2D62577F-6D40-4ec8-BB7E-E4C6F4E9C399}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\{9633FC1E-53D9-411f-916F-D2158AFBA481}.exeC:\Windows\{9633FC1E-53D9-411f-916F-D2158AFBA481}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\{6947693E-4A03-4bd0-AF88-846CB2D8A438}.exeC:\Windows\{6947693E-4A03-4bd0-AF88-846CB2D8A438}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exeC:\Windows\{ABA2647D-7BD7-4125-8BBD-3CC64F04D5A2}.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69476~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9633F~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D625~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AB5A7~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7274C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA1A8~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{43B00~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E722~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9806F~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CAB76~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD53c6d30346a02693e6d413dec6be319d0
SHA1596c575d1106a7bb0010b3cc57366c1a5d5d0509
SHA25654e623f7f9c86f88686d7afa06be6eed0d4e143fa27a6b801bc3531e83b86250
SHA5126e4c5a909bb4188f7bf07aaba1661944b55bab4bed83b6ff26a0facf33d6c16ecc25ea88c0bff8d83f391bfc0a70abaf1adcde0eaa2512b56624055c733bcb88
-
Filesize
380KB
MD5df0c177353b0af18abec31038802f32b
SHA1fcdc5c8ee31f63e00f57c1d709853bc17111209c
SHA256af790644407dab71dfb6cfa0cfbfce361566de33fc68b41062344c89d22c8bec
SHA5120031b43caaf46950b006b98d7223022d62eae8f8c5503cb94853a3464b7336ae7403f9b41f6ceb17cf28c7dd7a46d298430dda873845dc04c1cb9e07317863dd
-
Filesize
380KB
MD565ac2d8baaaf0361d3a035db48dbe316
SHA1c5e0d7d7b7ff77dd99776e78fb4338949cd7f38a
SHA256fba521b41bb64c183611aa05450fa54793318a89814ee1619343c4c99b03aff6
SHA512a32517adbaac3f6086d003c60c893a0e0d5e44793212b8074922a47a694bcce8c132d3f18cefded17f9a84b8eb0c975459ffc53740aa947404defd6f4b43a9aa
-
Filesize
380KB
MD59556085190983a77fa72198b2ec3145d
SHA1bcbe4e16b17e3eddbf2b499e56a1a792f8c32468
SHA2569a5c066c9286eb96f3ea214e7e6ace521a17d85ad6ac0ab8bec9592598f68e77
SHA5125253b3f2226151df63a88f69ea2a53ed87ef0070f35c6c20d8e65aeae96cb069c2a706cb8b166e83175c35fc871f6aeee8a35e5a46b2e59f5287e0e0c2b98a9a
-
Filesize
380KB
MD5db0d4fb750ff71f80ac1944db1e7b0ea
SHA1a00c64cc733bc71584433da988892145d895c60b
SHA25656f6b82556a871f272d24f8278922688af2776247d502f69a7e32bec98954b2c
SHA512889a13f93d04d471f98ea972453ee1c8480680e2c7176e2b536816251dd1de3fb9a709ff54dd09d60deaf5ae4130b77ab84d2dedd7715261b9328e9695d966c5
-
Filesize
380KB
MD58a0c35edb0ba22b7e55c27337dee3f9f
SHA181476d6abd167960215aeee4abe714704cb6d43a
SHA25693abf6b6bfd9c39e1c6151612a23c7f2ad56ee2e4ab9251c9106de6d7913da28
SHA512898b1ab17087db8964a4b0a15f4ec405fa4dda964bcda278cbb9f2ae3e556476da20a47af4a522effdb94060a476cbb9036b6ed03a92bb5ef40f974aacb50172
-
Filesize
380KB
MD5fd2b0559555ef170cd0112d57cf1782c
SHA12b97f8cc398ba9896f2236e77b51ac4c5a395193
SHA25625f344410a24f67a5d875436fea6980ab29989cb92c61b5f6697f5d673758693
SHA5126cfbb6bbd4cb47d090426ee11ece25d01ee61a2e318db7e0833f7d974f1dd79cd1a869dc2842ff1ca5ba19d7badeeeb45b4e9c4521bae4e36cda868dcb1631ed
-
Filesize
380KB
MD5903b641fccd7c89f365c8ab377b36e41
SHA10610208354a4f420dc155e8b462ffe13a84d3b53
SHA25633a195253c2c47f5d6fff747130544215566a86f66923cb207b379807ce90055
SHA51236ee4cc8d4ffc60c26221752bd9e24615550dc8f7e4b19cbf5a7856fd95810a68d747c1e2283420c57447a93b631741b9af877f57afc4d48b1d1c2abed11e8b9
-
Filesize
380KB
MD5c8f09fe754eb76bbd13f3465238db219
SHA1b097362291854202092f23d478a35b0cba2a47b1
SHA2564ad1d5c2632c1625c5b716d6d391735590f4f2aec100eb3aa2fe7e8a42f6a9cd
SHA5125e29eeae98ca3f476a4c939ff57237e6266ba45072c98759dd4531cbda9791170dd17dad808eb051dc0b6d0cb1a5366b26ae11749dcbbd96d5ab648c7d04a7fb
-
Filesize
380KB
MD569f1108a18282821ca861d1ef9e8016a
SHA19918218c1a6caef6fe8c58c65f09d52e11d3a1ba
SHA256c193c7ae764bcdec6f52578819cc258a049fbe5ac86814b7503e3838cc91b334
SHA5126c0790d21f5bb0a95cb11a4f6715d49500cc039084f5e18bef2315c73c600920357e00a7b10f2960b1386dcc877e137c72eb6e76012f89a70a1e419a75938d2a
-
Filesize
380KB
MD57996e193b40d543144de197d93bfeec3
SHA1820f1f1d5005b796c187124f50f96903407f428e
SHA25618d4ad4ee1ed4f8852c017e8fa23ba4a881eabc72f0f3c4d389b10a62ef37493
SHA512a230d1b718f33204005fd977b2d47059cadd0b1020d9db022c9066979edf7852610f7ec186f160b188a15c7cbee79944e215809efc4de5a3e6308c4a5a27ff0d