Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe
-
Size
408KB
-
MD5
6f3518815a4556a1edb0c30430ed1a17
-
SHA1
d092b17682bbc9937060f3b6fc66cb821d1eb51e
-
SHA256
39ebe26486ffc1198f4995d7060e77c0c13cc52a84a13002735decb2a6ae0e7e
-
SHA512
8e2a112ee9534d7364e150934a1ed002074a1fdf1f23f67fa3d94ad42b2b616e3c79f617c44a7ab22cbf614b039d223a3a5b550edee95bfe91da536b409e3233
-
SSDEEP
3072:CEGh0oBl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGnldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB06975C-513A-4c95-8068-11E3748F1CC8} {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DCD59EF-1274-4896-B593-29470B6A6497}\stubpath = "C:\\Windows\\{4DCD59EF-1274-4896-B593-29470B6A6497}.exe" {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E} {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2} {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714} {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DCD59EF-1274-4896-B593-29470B6A6497} {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD6B37A0-BE24-4e74-A76D-7392A26B167A}\stubpath = "C:\\Windows\\{FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe" {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD6B37A0-BE24-4e74-A76D-7392A26B167A} {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714}\stubpath = "C:\\Windows\\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe" {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D} {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}\stubpath = "C:\\Windows\\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe" {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F35B914-8825-48b2-B3E2-735623225919} {4DCD59EF-1274-4896-B593-29470B6A6497}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F35B914-8825-48b2-B3E2-735623225919}\stubpath = "C:\\Windows\\{6F35B914-8825-48b2-B3E2-735623225919}.exe" {4DCD59EF-1274-4896-B593-29470B6A6497}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9BA341C6-C3F1-43ac-993F-10C03C167A64} {6F35B914-8825-48b2-B3E2-735623225919}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB} 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}\stubpath = "C:\\Windows\\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe" {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8882D74A-C7F4-43d9-86CD-C259BD284C0D}\stubpath = "C:\\Windows\\{8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe" {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9BA341C6-C3F1-43ac-993F-10C03C167A64}\stubpath = "C:\\Windows\\{9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe" {6F35B914-8825-48b2-B3E2-735623225919}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{775382BE-8AE3-4f47-974C-3987B316E6DA} {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{775382BE-8AE3-4f47-974C-3987B316E6DA}\stubpath = "C:\\Windows\\{775382BE-8AE3-4f47-974C-3987B316E6DA}.exe" {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FB06975C-513A-4c95-8068-11E3748F1CC8}\stubpath = "C:\\Windows\\{FB06975C-513A-4c95-8068-11E3748F1CC8}.exe" {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8882D74A-C7F4-43d9-86CD-C259BD284C0D} {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}\stubpath = "C:\\Windows\\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exe" {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}\stubpath = "C:\\Windows\\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe" 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe -
Executes dropped EXE 12 IoCs
pid Process 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe 4444 {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe 4744 {75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe File created C:\Windows\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe File created C:\Windows\{FB06975C-513A-4c95-8068-11E3748F1CC8}.exe {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe File created C:\Windows\{6F35B914-8825-48b2-B3E2-735623225919}.exe {4DCD59EF-1274-4896-B593-29470B6A6497}.exe File created C:\Windows\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe File created C:\Windows\{8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe File created C:\Windows\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exe {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe File created C:\Windows\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe File created C:\Windows\{FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe File created C:\Windows\{775382BE-8AE3-4f47-974C-3987B316E6DA}.exe {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe File created C:\Windows\{4DCD59EF-1274-4896-B593-29470B6A6497}.exe {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe File created C:\Windows\{9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe {6F35B914-8825-48b2-B3E2-735623225919}.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4DCD59EF-1274-4896-B593-29470B6A6497}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {6F35B914-8825-48b2-B3E2-735623225919}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe Token: SeIncBasePriorityPrivilege 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe Token: SeIncBasePriorityPrivilege 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe Token: SeIncBasePriorityPrivilege 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe Token: SeIncBasePriorityPrivilege 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe Token: SeIncBasePriorityPrivilege 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe Token: SeIncBasePriorityPrivilege 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe Token: SeIncBasePriorityPrivilege 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe Token: SeIncBasePriorityPrivilege 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe Token: SeIncBasePriorityPrivilege 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe Token: SeIncBasePriorityPrivilege 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe Token: SeIncBasePriorityPrivilege 4444 {8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2056 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 95 PID 1788 wrote to memory of 2056 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 95 PID 1788 wrote to memory of 2056 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 95 PID 1788 wrote to memory of 3468 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 96 PID 1788 wrote to memory of 3468 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 96 PID 1788 wrote to memory of 3468 1788 2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe 96 PID 2056 wrote to memory of 1736 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 97 PID 2056 wrote to memory of 1736 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 97 PID 2056 wrote to memory of 1736 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 97 PID 2056 wrote to memory of 1668 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 98 PID 2056 wrote to memory of 1668 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 98 PID 2056 wrote to memory of 1668 2056 {7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe 98 PID 1736 wrote to memory of 1428 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 102 PID 1736 wrote to memory of 1428 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 102 PID 1736 wrote to memory of 1428 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 102 PID 1736 wrote to memory of 3452 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 103 PID 1736 wrote to memory of 3452 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 103 PID 1736 wrote to memory of 3452 1736 {FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe 103 PID 1428 wrote to memory of 1116 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 104 PID 1428 wrote to memory of 1116 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 104 PID 1428 wrote to memory of 1116 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 104 PID 1428 wrote to memory of 448 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 105 PID 1428 wrote to memory of 448 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 105 PID 1428 wrote to memory of 448 1428 {56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe 105 PID 1116 wrote to memory of 2028 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 106 PID 1116 wrote to memory of 2028 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 106 PID 1116 wrote to memory of 2028 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 106 PID 1116 wrote to memory of 5052 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 107 PID 1116 wrote to memory of 5052 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 107 PID 1116 wrote to memory of 5052 1116 {775382BE-8AE3-4f47-974C-3987B316E6DA}.exe 107 PID 2028 wrote to memory of 1396 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 108 PID 2028 wrote to memory of 1396 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 108 PID 2028 wrote to memory of 1396 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 108 PID 2028 wrote to memory of 4980 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 109 PID 2028 wrote to memory of 4980 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 109 PID 2028 wrote to memory of 4980 2028 {D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe 109 PID 1396 wrote to memory of 3472 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 110 PID 1396 wrote to memory of 3472 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 110 PID 1396 wrote to memory of 3472 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 110 PID 1396 wrote to memory of 2680 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 111 PID 1396 wrote to memory of 2680 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 111 PID 1396 wrote to memory of 2680 1396 {FB06975C-513A-4c95-8068-11E3748F1CC8}.exe 111 PID 3472 wrote to memory of 3036 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 112 PID 3472 wrote to memory of 3036 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 112 PID 3472 wrote to memory of 3036 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 112 PID 3472 wrote to memory of 680 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 113 PID 3472 wrote to memory of 680 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 113 PID 3472 wrote to memory of 680 3472 {4DCD59EF-1274-4896-B593-29470B6A6497}.exe 113 PID 3036 wrote to memory of 2204 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 114 PID 3036 wrote to memory of 2204 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 114 PID 3036 wrote to memory of 2204 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 114 PID 3036 wrote to memory of 788 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 115 PID 3036 wrote to memory of 788 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 115 PID 3036 wrote to memory of 788 3036 {6F35B914-8825-48b2-B3E2-735623225919}.exe 115 PID 2204 wrote to memory of 1248 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 116 PID 2204 wrote to memory of 1248 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 116 PID 2204 wrote to memory of 1248 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 116 PID 2204 wrote to memory of 4060 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 117 PID 2204 wrote to memory of 4060 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 117 PID 2204 wrote to memory of 4060 2204 {9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe 117 PID 1248 wrote to memory of 4444 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe 118 PID 1248 wrote to memory of 4444 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe 118 PID 1248 wrote to memory of 4444 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe 118 PID 1248 wrote to memory of 1796 1248 {9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_6f3518815a4556a1edb0c30430ed1a17_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exeC:\Windows\{7BDFBF2D-C836-4fa2-9190-05D6D1285FEB}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\{FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exeC:\Windows\{FD6B37A0-BE24-4e74-A76D-7392A26B167A}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exeC:\Windows\{56B608B0-500E-4e22-B4BB-AEDF3DD3D714}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\{775382BE-8AE3-4f47-974C-3987B316E6DA}.exeC:\Windows\{775382BE-8AE3-4f47-974C-3987B316E6DA}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exeC:\Windows\{D2FCB41D-7C2B-4096-AB06-9A5F37C0793D}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{FB06975C-513A-4c95-8068-11E3748F1CC8}.exeC:\Windows\{FB06975C-513A-4c95-8068-11E3748F1CC8}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\{4DCD59EF-1274-4896-B593-29470B6A6497}.exeC:\Windows\{4DCD59EF-1274-4896-B593-29470B6A6497}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\{6F35B914-8825-48b2-B3E2-735623225919}.exeC:\Windows\{6F35B914-8825-48b2-B3E2-735623225919}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\{9BA341C6-C3F1-43ac-993F-10C03C167A64}.exeC:\Windows\{9BA341C6-C3F1-43ac-993F-10C03C167A64}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exeC:\Windows\{9C1179B7-1FAA-4e1c-8CA0-24E4AA71343E}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\{8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exeC:\Windows\{8882D74A-C7F4-43d9-86CD-C259BD284C0D}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4444 -
C:\Windows\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exeC:\Windows\{75DB7F4D-D2C7-48a0-AC96-4DFB068C8FB2}.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8882D~1.EXE > nul13⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9C117~1.EXE > nul12⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9BA34~1.EXE > nul11⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6F35B~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4DCD5~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB069~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D2FCB~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{77538~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{56B60~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD6B3~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7BDFB~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5d633bea34aa9edbc8db55e7649bc3cbd
SHA1ebede2e10e4a3c816553b79a00024a987b74700d
SHA256640c1e9c1b8da7efe34b0d4f38c5d201463429237eb8ce07bd331958231f03dc
SHA5122e13f6789426672b7bda04652fce8d2dde0ddaf30564c13ac4e06afcfb810c97f86c2f122f778af0428aa7fb9d52f5edf747fa697f9aad9fd21bcb9b1f7cbb12
-
Filesize
408KB
MD5c72b9467a5f64aa365f854f9dde94e20
SHA1ca6982f60fade3ebec66c80422faa2827c7fce97
SHA25600009102965e44119dfd0dba2d26f3fc89c8edb7c2afc79d75a190707c857e76
SHA512a425c274a0d7c0fb64aa0ff31384d8c90fe9c2d60ea4c0144d759c938ff6aef1f8ac54eea7290bce5a8c73659b200e9ba66a405cb4edd035d9c7ed9e5500c680
-
Filesize
408KB
MD5cacb8224926db235e93ede2a26073a32
SHA17cbfb35f35b5fcdc61d6b8cea7fb6b902f81c8d4
SHA256c077e9530db6d79de9b0c50ffb307ad208132d581e5db1851d765c77f7aa3897
SHA5127d13a353edd668dfae3c4e44d6103fe41617eaaab714b0a30aff78cfede21dcec502387f8a33ebd685e141033f1b8fd878ea06572a938a23329d22e6d70c0f60
-
Filesize
408KB
MD55791423c0133e4d6616a0d182b4055db
SHA1b505602b22e662d8ea08cc092da33d63feebeb9f
SHA2565ee5c1844dced6350106f183e4e275d61027eac3bcd174be2018346854c26354
SHA51216bab59e808f67d49a5d34846a1c51b458dba3d3e88afd662c1d69613fb6e05d5dd5855a9488d32efb8f2513a3fe64bcb32e9e280a9ecb25b9d46800fa9c60e1
-
Filesize
408KB
MD507292d7bc8023472114a7abe0078ecc2
SHA1f0a612c2840108497d863ad5d6ab65fdf3e9a9fb
SHA256171c12843e767371442f680e2fdb4e088449eea35da6d979354610cbae7a1c7d
SHA512b22d75a79c4d03f72dd316e491bb025e51df3886f5aa8c3e08eecb2ccc6cb6233ecae9876eff971f606a44d89d0a70911ea1d5b64d8f9937fa23d4fd99b81051
-
Filesize
408KB
MD59184f1b52c25532c8c4914fc3c8ab997
SHA189fda6b4e87df207d693b272a860028ae8cdae3d
SHA2560216c7c184f69d903b236e6c36bc13579a015a9b77b943040d4601363003523b
SHA512168c1f6992f18cf43e576a52da2b24917b8d69cbb31c10413700926a0cd0fdd8b03e2b842473e6293b5c774b62b8bfe5be1e0be41a82f76f4ddaf003a87eb85d
-
Filesize
408KB
MD593379ca04e071a549bd85f1be9d51e46
SHA1bc8459cf8adf126127dd27068de6bd203603171b
SHA256f56028a1dd1507b15c87ff9065d8fd8b20838e0f963c9f086d6cf8ffcfb8e6bc
SHA5123d78922f3937ee6518e1310e36e471dc11062725c948a37d2e9e26299502bd29f64c700d43f56ab3adaad5639a7b98a7a04c67b1b38ba722dfd7b6ae9b2a9aef
-
Filesize
408KB
MD51a2cefa97e3a2b9ca1d55079a3050d44
SHA11e2fec9d08942c2e0cc217bb10f8acfc649c8976
SHA256721c8008c0324b18888c8c97564692d4318155c499eb0d4b6246a59c1eca112d
SHA512488ed079ae93a02f3679b4b018bbb0d017320c5cbc3931bd3d8d4757db0a912d53a632c0d6d8e52d22f6a7337f65a551e196567b1cd2d086c1818a0d697eff30
-
Filesize
408KB
MD5d1b7e7ae8c30b211c82a66cd162e1f76
SHA1346a07b0090c5a4b35ff07e37b714908b784a0ff
SHA2569b2573e13a6f96074961f8d57b2ec438234e37dff5157d6a879c6499a0e75c79
SHA512ef526f18f8e2caa950ade62cf2e96d2eb928d5d5d019aacabbf35bba328eda1bff2994ee271f7690fdf4e55beaf4237c7be6c217b5195de90fcbc851868f784c
-
Filesize
408KB
MD51d0bc16302ff279febd55b95f3715b8d
SHA1a433354978fece0db0827b547381e626782c6766
SHA256aeb26d7ccf4e9bf654d4beada9bc9ad7846c98964a8afbc9e9ea3a6dab4a8ca3
SHA5127f297e89e809c22b4797565bb5b379363d8baab5223a2784b3ec287380378cf35fffbec86a1c88af37de8e8030098723a9e4ab9fd65a87c6a3d44c0c1414fcdf
-
Filesize
408KB
MD59ebf426392e234e0684c31ac6b44fe0b
SHA157392244d287288de1ba103334c4c242a3f052ce
SHA256154876d703df12f87407e60c0265c6e22aadfa7b54a05e9dbe4e91d3a1d4d250
SHA51222a7236dc6b6df980a5364d26803c8f7a6e8afca945909742f539ac9041ae3e5f9fa04889edc1c8723bd15c91ef46c68fa6b87a96bab805635fdbcc0c15193d3
-
Filesize
408KB
MD545a7344789707856115d98dd9ea3d52e
SHA1b41324b6692bd947ae3f21f6970e37b688a0c8ce
SHA2566b12b685d03905dff2dcf0564323e3884940fb45e494d80cada83ae93b610c19
SHA512fb399cb8c290817cffd2bec499750707bf47bdeeabb1cd422c8bab5a3280c9168ff83758253e6be11b34740231473c95bc657536c54d05bf40d26c5bc838fc69