Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe
-
Size
216KB
-
MD5
7c81ef9b1129e9b8f40aad7923d69bcf
-
SHA1
f6c7cb23f5df344b9aa48ef9f776aad8be6332ce
-
SHA256
c2ca0cceca01f41b5e4df1fac14f86af5f1b5e65e23e2df9833c139d8084c146
-
SHA512
3e163e7fbce84beee03988f284017675e1ab9d72e75d040f1db91e17e46d57728b681c250698a2fe34d627c9338586553b3a8f0a5913e9e8b7c18b4d9d23a119
-
SSDEEP
3072:jEGh0odl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGLlEeKcAEcGy
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe{24925A42-5AFE-49c8-98AB-6602984533DA}.exe{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BBC8706-6798-4900-BD38-5718E22A4E54}\stubpath = "C:\\Windows\\{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe" {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A42E299B-CE1D-468c-B88C-32EDC230343C} {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F} {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233} {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B53C9D5B-CCB7-4600-A32B-9D073DA92499} {24925A42-5AFE-49c8-98AB-6602984533DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}\stubpath = "C:\\Windows\\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe" {24925A42-5AFE-49c8-98AB-6602984533DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}\stubpath = "C:\\Windows\\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exe" {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F} {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E} 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}\stubpath = "C:\\Windows\\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe" 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4BBC8706-6798-4900-BD38-5718E22A4E54} {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4C4BB7D-C131-4618-963E-B305AF154B1D} {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41} {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}\stubpath = "C:\\Windows\\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe" {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}\stubpath = "C:\\Windows\\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe" {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}\stubpath = "C:\\Windows\\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe" {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}\stubpath = "C:\\Windows\\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe" {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A42E299B-CE1D-468c-B88C-32EDC230343C}\stubpath = "C:\\Windows\\{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe" {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4C4BB7D-C131-4618-963E-B305AF154B1D}\stubpath = "C:\\Windows\\{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe" {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B} {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}\stubpath = "C:\\Windows\\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe" {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24925A42-5AFE-49c8-98AB-6602984533DA} {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{24925A42-5AFE-49c8-98AB-6602984533DA}\stubpath = "C:\\Windows\\{24925A42-5AFE-49c8-98AB-6602984533DA}.exe" {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27DE2445-F6AB-4370-8F92-04F7A811D6AB} {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe -
Executes dropped EXE 12 IoCs
Processes:
{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe{24925A42-5AFE-49c8-98AB-6602984533DA}.exe{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exepid process 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe 5064 {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe 3580 {27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exe -
Drops file in Windows directory 12 IoCs
Processes:
{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe{24925A42-5AFE-49c8-98AB-6602984533DA}.exe2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exedescription ioc process File created C:\Windows\{24925A42-5AFE-49c8-98AB-6602984533DA}.exe {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe File created C:\Windows\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe {24925A42-5AFE-49c8-98AB-6602984533DA}.exe File created C:\Windows\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe File created C:\Windows\{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe File created C:\Windows\{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe File created C:\Windows\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe File created C:\Windows\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe File created C:\Windows\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe File created C:\Windows\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exe {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe File created C:\Windows\{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe File created C:\Windows\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe File created C:\Windows\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe{24925A42-5AFE-49c8-98AB-6602984533DA}.exe{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exedescription pid process Token: SeIncBasePriorityPrivilege 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe Token: SeIncBasePriorityPrivilege 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe Token: SeIncBasePriorityPrivilege 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe Token: SeIncBasePriorityPrivilege 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe Token: SeIncBasePriorityPrivilege 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe Token: SeIncBasePriorityPrivilege 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe Token: SeIncBasePriorityPrivilege 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe Token: SeIncBasePriorityPrivilege 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe Token: SeIncBasePriorityPrivilege 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe Token: SeIncBasePriorityPrivilege 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe Token: SeIncBasePriorityPrivilege 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe Token: SeIncBasePriorityPrivilege 5064 {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe{24925A42-5AFE-49c8-98AB-6602984533DA}.exedescription pid process target process PID 1572 wrote to memory of 720 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe PID 1572 wrote to memory of 720 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe PID 1572 wrote to memory of 720 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe PID 1572 wrote to memory of 4388 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe cmd.exe PID 1572 wrote to memory of 4388 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe cmd.exe PID 1572 wrote to memory of 4388 1572 2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe cmd.exe PID 720 wrote to memory of 3852 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe PID 720 wrote to memory of 3852 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe PID 720 wrote to memory of 3852 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe PID 720 wrote to memory of 1872 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe cmd.exe PID 720 wrote to memory of 1872 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe cmd.exe PID 720 wrote to memory of 1872 720 {FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe cmd.exe PID 3852 wrote to memory of 3952 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe PID 3852 wrote to memory of 3952 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe PID 3852 wrote to memory of 3952 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe PID 3852 wrote to memory of 544 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe cmd.exe PID 3852 wrote to memory of 544 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe cmd.exe PID 3852 wrote to memory of 544 3852 {4BBC8706-6798-4900-BD38-5718E22A4E54}.exe cmd.exe PID 3952 wrote to memory of 416 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe PID 3952 wrote to memory of 416 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe PID 3952 wrote to memory of 416 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe PID 3952 wrote to memory of 2884 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe cmd.exe PID 3952 wrote to memory of 2884 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe cmd.exe PID 3952 wrote to memory of 2884 3952 {A42E299B-CE1D-468c-B88C-32EDC230343C}.exe cmd.exe PID 416 wrote to memory of 3356 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe PID 416 wrote to memory of 3356 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe PID 416 wrote to memory of 3356 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe PID 416 wrote to memory of 4828 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe cmd.exe PID 416 wrote to memory of 4828 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe cmd.exe PID 416 wrote to memory of 4828 416 {F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe cmd.exe PID 3356 wrote to memory of 2460 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe PID 3356 wrote to memory of 2460 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe PID 3356 wrote to memory of 2460 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe PID 3356 wrote to memory of 1644 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe cmd.exe PID 3356 wrote to memory of 1644 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe cmd.exe PID 3356 wrote to memory of 1644 3356 {C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe cmd.exe PID 2460 wrote to memory of 368 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe PID 2460 wrote to memory of 368 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe PID 2460 wrote to memory of 368 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe PID 2460 wrote to memory of 1496 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe cmd.exe PID 2460 wrote to memory of 1496 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe cmd.exe PID 2460 wrote to memory of 1496 2460 {55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe cmd.exe PID 368 wrote to memory of 2804 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe PID 368 wrote to memory of 2804 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe PID 368 wrote to memory of 2804 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe PID 368 wrote to memory of 2268 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe cmd.exe PID 368 wrote to memory of 2268 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe cmd.exe PID 368 wrote to memory of 2268 368 {34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe cmd.exe PID 2804 wrote to memory of 3236 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe PID 2804 wrote to memory of 3236 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe PID 2804 wrote to memory of 3236 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe PID 2804 wrote to memory of 60 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe cmd.exe PID 2804 wrote to memory of 60 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe cmd.exe PID 2804 wrote to memory of 60 2804 {0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe cmd.exe PID 3236 wrote to memory of 3060 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe {24925A42-5AFE-49c8-98AB-6602984533DA}.exe PID 3236 wrote to memory of 3060 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe {24925A42-5AFE-49c8-98AB-6602984533DA}.exe PID 3236 wrote to memory of 3060 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe {24925A42-5AFE-49c8-98AB-6602984533DA}.exe PID 3236 wrote to memory of 2612 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe cmd.exe PID 3236 wrote to memory of 2612 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe cmd.exe PID 3236 wrote to memory of 2612 3236 {0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe cmd.exe PID 3060 wrote to memory of 5064 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe PID 3060 wrote to memory of 5064 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe PID 3060 wrote to memory of 5064 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe {B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe PID 3060 wrote to memory of 4700 3060 {24925A42-5AFE-49c8-98AB-6602984533DA}.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-05_7c81ef9b1129e9b8f40aad7923d69bcf_goldeneye.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exeC:\Windows\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{4BBC8706-6798-4900-BD38-5718E22A4E54}.exeC:\Windows\{4BBC8706-6798-4900-BD38-5718E22A4E54}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{A42E299B-CE1D-468c-B88C-32EDC230343C}.exeC:\Windows\{A42E299B-CE1D-468c-B88C-32EDC230343C}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exeC:\Windows\{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exeC:\Windows\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exeC:\Windows\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exeC:\Windows\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exeC:\Windows\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exeC:\Windows\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exe10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{24925A42-5AFE-49c8-98AB-6602984533DA}.exeC:\Windows\{24925A42-5AFE-49c8-98AB-6602984533DA}.exe11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exeC:\Windows\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exe12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exeC:\Windows\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exe13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B53C9~1.EXE > nul13⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{24925~1.EXE > nul12⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B0D7~1.EXE > nul11⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0D5F9~1.EXE > nul10⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34AF2~1.EXE > nul9⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{55DB7~1.EXE > nul8⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C84FD~1.EXE > nul7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4C4B~1.EXE > nul6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A42E2~1.EXE > nul5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4BBC8~1.EXE > nul4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FE412~1.EXE > nul3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\{0B0D7E4F-3C43-410a-8B35-AB8D0F941233}.exeFilesize
216KB
MD5e510915eddc052ebe45a28487a8e8577
SHA1a7b2b9cd46b8bf701297b43723603253129c2077
SHA256810a779c8e52f5c77c8047fe3b4f62b94972ebc75992526dfbf0984cd90c2dc5
SHA5122e1d606ba42925ac7d146fb7f613b893da0fa6f03ed721b23bfc3310250f128cf6a5664224fe6c4c34bd3df447a47b4b2a73f73e77bbe60722c4a9f8109f33ce
-
C:\Windows\{0D5F9D59-9B1C-4209-A60F-CB0A70D4199B}.exeFilesize
216KB
MD54d74d010b7cfd5446e245b75d95f8748
SHA1160fec4405191ee3db0ab9d22c14cc53c2e74b55
SHA256f84f12cff3bcf4f79e478b96ae73530e5e90f64f38fc7eec29db489c277af375
SHA5122a8e8cc4fdc549b9e24145e9dfcb29c9f23dc9a0755d086fb9f06c0e4bb703044827f791886081cdcf75b8a6f4919a9cb13ffc50621dde29fe59d1f72ce208ea
-
C:\Windows\{24925A42-5AFE-49c8-98AB-6602984533DA}.exeFilesize
216KB
MD538aba599ef008769a213c5c484bd92c9
SHA1af5b0b377cb2abfa8b303782e2efd1ffd3fb7d4c
SHA256785718c229e971e9d3dde194492f07453468f3c9cad09dcb1d53f0228695311c
SHA5124a5ae3a03aa4efb364ea61e7941d7d2060458bc78214e917f7edf7b3766e7595f30037ec392b05ee4308f87e8c2dd95046d35c3e3658f6265271f8cb33159093
-
C:\Windows\{27DE2445-F6AB-4370-8F92-04F7A811D6AB}.exeFilesize
216KB
MD5fbda4f8418b48e4158789642a77d65b9
SHA191d82fcb4c8aa9330e76b6ee8efc45e54f03c1bb
SHA256c127c51e075c5c431ab4e5755549606f4445630015daa9abcbb2a285fbbf2706
SHA5124ba94f451140c5bac99be2f3748d45007a6477cafd00b84c7919eacf9f434d8994b4f6a5e369e026f9c54e73c5677dc804ad45831ce9a19edfa5a138f1769149
-
C:\Windows\{34AF2BEA-F2FB-4f97-9DF7-2798AFF0CA1F}.exeFilesize
216KB
MD5096282806e9a6a2d8ba4ab7e81c8629f
SHA1b6bf456fafc786ed28d1bcb87735a619c340ad8d
SHA256f294e498bfd7e11398c433aa11a710d855f4efd92bf97101c88c340dc0e1d324
SHA512790e5ad0a1ad9b0dad1d6e1abfb321445b38ce9a97ba78d71c8a53a844476e9dcc3e1db1c9e8a0593e1adb820d9791e946a7daae6356c84cc5358a4e2c6e07c5
-
C:\Windows\{4BBC8706-6798-4900-BD38-5718E22A4E54}.exeFilesize
216KB
MD5c42aa8c7bd717b1c85df6195ed948405
SHA1c3e171bd814cd440f264121cc5187f451cac224f
SHA256ac1680acb1d94dea2fed6c58f42e5db3b917d2f8e1a149cb62f5a319d0d8b5da
SHA5124f541ef6e547a69fbbe6888f2aeb7328b892e8eb1007511d2d860104b44468e5d531a473c761732dcbd3692bb4611c029d072b5c1e3a5db9686f85b9078593a0
-
C:\Windows\{55DB77F5-5C20-4ea4-9FC4-B93154C2223F}.exeFilesize
216KB
MD570e52d1378278948ea931f7dc5e003b4
SHA1febca67778ee876cfc95faf29ecfd33e2d421319
SHA25617c30046d3c5c189d5b069eb353568c1238415b3bff634e23e77e07bf04ba53d
SHA51255455349a8dc1d83294381362ec36bd3429790d516d28a0d2b68626515987348701e1dfa4e186f7ff85c2a90b941f30038e3fd1c3c1dff001f5fcac92cfd0182
-
C:\Windows\{A42E299B-CE1D-468c-B88C-32EDC230343C}.exeFilesize
216KB
MD5af2d0c3c3711f3a0284518430334a771
SHA15049232dd099c7b23c901ef9e07292163ed292ca
SHA256b3c0f0ece7e01398fd29acf5396b336750c62bbaa85de0f8e2ee8f76dc9e8ab7
SHA51243548250c820816d45c61dee6730048ea8d63abe5041b7f3ab4d4ccbb1bf717ecf99d80440c071bea0b8035bfc8f5cbc3fd4f6322c4d8d06ce3a1d322c6a6af6
-
C:\Windows\{B53C9D5B-CCB7-4600-A32B-9D073DA92499}.exeFilesize
216KB
MD5d41af04aeec9165d8cad66ff535821a0
SHA195a46825dc95e1cbd1620929daa468a9255efaa3
SHA25691a5430e7006fbc11344456d3d6b486ed4709c53ee6124897386f06baa893fc3
SHA512e876401f7e3c8bd772069ef3b877bf7f65108d182aae31b4cc37ccf410dea4b20c0d3974028869ef642adb7054a108377f8969d80341081e1ff233c5c1fce9dd
-
C:\Windows\{C84FD8AD-068A-44ca-80D5-2EF7DC135A41}.exeFilesize
216KB
MD5f28c9c4bd98a86f02482ec2a902cb23e
SHA1f5952e0b956d9641f324c47889acebbc278c5e4c
SHA256d927637e34e6ffb8d8177f9316370ef432a0cd016a179664c042f749ef5450d5
SHA51255f9818f11a5374c65d865a67b9ea9b297cb16b7f0738b07f06bb776905351597f29cd824acd25db1612b831a4238706253348cc6074c7ce103f6d598b0958bb
-
C:\Windows\{F4C4BB7D-C131-4618-963E-B305AF154B1D}.exeFilesize
216KB
MD58970aba6b74918016c8da7d2768d1d57
SHA1f0b532ebb07b7364ebaa9d6e5934bfd76c6d8f17
SHA256aad71107b6d5c019e2c8bf3ec0fef2f6d7ec14f1a0e2ac0724c7951c341a4a82
SHA5127bd0c6519ea05536a5633e3a0a2648610ea7a69f856cd7d8bfd8b527d82cc39c2a6130d1f6ea3d1bab601cc98fdcd1b63a6ce4c8b753cd5410a8eccbe4c90623
-
C:\Windows\{FE412DB9-C95A-41ba-8C9F-1E1A71F2929E}.exeFilesize
216KB
MD52e85b75cc92689f1b87e3803fbb36efa
SHA1e828c2ccfa1aa2ab615282d50f10c5ffb9da06a0
SHA256e480a9ca0277f5e097299f85cf7ad56bcc62d3723a1e7aafe3f0a5d976e41570
SHA512dad937f044e3bdde3009476021a64cf957ac680f76988a7b7b6adca12cd7a9519cb141b351433b837ffba802bc3a05b1296a9583c77095ab32c8d2356e089154