Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    02-07-2020 14:26

General

  • Target

    GoldenSpy (6).exe

  • Size

    366KB

  • MD5

    b363e855f613233848a0a89216488bfb

  • SHA1

    c897972dfd26a07591cabbeeeeeb1db18f2f21d4

  • SHA256

    20932b2151de5f0dc5c1159fbc1d2d004f069bb04d32d66dc7fa5b7b9eac1aa7

  • SHA512

    47d65f9d64e2d9fd5fe78731d990dadb6148240477dc20ef9305ae5d32345ef2d28e82a10d40e2139141bf0c25556eb633b0c7cf1139989ec0bf0a610d6efeda

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 13 IoCs
  • GoldenSpy

    Backdoor spotted in June 2020 being distributed with the Chinese "Intelligent Tax" software.

  • Drops file in System32 directory 30 IoCs
  • Modifies data under HKEY_USERS 104 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 199 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Modifies service 2 TTPs 6 IoCs
  • GoldenSpy Payload 32 IoCs
  • Executes dropped EXE 30 IoCs
  • Program crash 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GoldenSpy (6).exe
    "C:\Users\Admin\AppData\Local\Temp\GoldenSpy (6).exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -i
      2⤵
      • Modifies service
      • Executes dropped EXE
      PID:1928
    • C:\Program Files (x86)\svm\svmm.exe
      "C:\Program Files (x86)\svm\svmm.exe" -i
      2⤵
      • Modifies service
      • Executes dropped EXE
      PID:2120
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:2492
    • C:\Program Files (x86)\svm\svmm.exe
      "C:\Program Files (x86)\svm\svmm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:2568
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 984
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:4028
  • C:\Program Files (x86)\svm\svmm.exe
    "C:\Program Files (x86)\svm\svmm.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    PID:4072
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:3060
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:868
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:3360
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:1192
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:2096
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:1920
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:1672
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:376
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:356
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:4028
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:2192
    • C:\Program Files (x86)\svm\svm.exe
      "C:\Program Files (x86)\svm\svm.exe" -start
      2⤵
      • Executes dropped EXE
      PID:3704
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 680
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:4000
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 668
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1064
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 664
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1000
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:1140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 668
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2304
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2124
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 668
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2148
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 668
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3692
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 664
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3608
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3632
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 676
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3404
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:1360
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 828
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3384
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 664
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3772
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2124
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 676
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
  • C:\Program Files (x86)\svm\svm.exe
    "C:\Program Files (x86)\svm\svm.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 664
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\log\20200702-svm.log
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svm.exe
  • C:\Program Files (x86)\svm\svmm.exe
  • C:\Program Files (x86)\svm\svmm.exe
  • C:\Program Files (x86)\svm\svmm.exe
  • C:\Program Files (x86)\svm\svmm.exe
  • \Users\Admin\AppData\Local\Temp\nsq167D.tmp\processwork.dll
  • \Users\Admin\AppData\Local\Temp\nsq167D.tmp\processwork.dll
  • \Users\Admin\AppData\Local\Temp\nsq167D.tmp\processwork.dll
  • \Users\Admin\AppData\Local\Temp\nsq167D.tmp\processwork.dll
  • memory/356-136-0x0000000000000000-mapping.dmp
  • memory/376-129-0x0000000000000000-mapping.dmp
  • memory/820-214-0x0000000003650000-0x0000000003651000-memory.dmp
    Filesize

    4KB

  • memory/820-215-0x0000000003F90000-0x0000000003F91000-memory.dmp
    Filesize

    4KB

  • memory/868-25-0x0000000000000000-mapping.dmp
  • memory/1000-36-0x0000000003A90000-0x0000000003A91000-memory.dmp
    Filesize

    4KB

  • memory/1000-38-0x0000000004350000-0x0000000004351000-memory.dmp
    Filesize

    4KB

  • memory/1064-29-0x0000000003400000-0x0000000003401000-memory.dmp
    Filesize

    4KB

  • memory/1064-31-0x0000000003CC0000-0x0000000003CC1000-memory.dmp
    Filesize

    4KB

  • memory/1192-39-0x0000000000000000-mapping.dmp
  • memory/1672-117-0x0000000000000000-mapping.dmp
  • memory/1772-203-0x0000000003950000-0x0000000003951000-memory.dmp
    Filesize

    4KB

  • memory/1772-207-0x00000000042D0000-0x00000000042D1000-memory.dmp
    Filesize

    4KB

  • memory/1920-106-0x0000000000000000-mapping.dmp
  • memory/1928-4-0x0000000000000000-mapping.dmp
  • memory/2096-51-0x0000000000000000-mapping.dmp
  • memory/2120-7-0x0000000000000000-mapping.dmp
  • memory/2148-57-0x0000000004190000-0x0000000004191000-memory.dmp
    Filesize

    4KB

  • memory/2148-55-0x0000000003910000-0x0000000003911000-memory.dmp
    Filesize

    4KB

  • memory/2192-199-0x0000000000000000-mapping.dmp
  • memory/2304-43-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/2304-47-0x0000000003A50000-0x0000000003A51000-memory.dmp
    Filesize

    4KB

  • memory/2304-44-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/2492-10-0x0000000000000000-mapping.dmp
  • memory/2568-12-0x0000000000000000-mapping.dmp
  • memory/3060-18-0x0000000000000000-mapping.dmp
  • memory/3360-32-0x0000000000000000-mapping.dmp
  • memory/3384-143-0x0000000003BD0000-0x0000000003BD1000-memory.dmp
    Filesize

    4KB

  • memory/3404-133-0x00000000033D0000-0x00000000033D1000-memory.dmp
    Filesize

    4KB

  • memory/3404-135-0x0000000003C80000-0x0000000003C81000-memory.dmp
    Filesize

    4KB

  • memory/3608-127-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/3608-125-0x0000000003AA0000-0x0000000003AA1000-memory.dmp
    Filesize

    4KB

  • memory/3608-126-0x0000000003120000-0x0000000003121000-memory.dmp
    Filesize

    4KB

  • memory/3692-114-0x0000000003BD0000-0x0000000003BD1000-memory.dmp
    Filesize

    4KB

  • memory/3692-115-0x0000000003250000-0x0000000003251000-memory.dmp
    Filesize

    4KB

  • memory/3692-110-0x0000000003250000-0x0000000003251000-memory.dmp
    Filesize

    4KB

  • memory/3704-210-0x0000000000000000-mapping.dmp
  • memory/3772-198-0x0000000004010000-0x0000000004011000-memory.dmp
    Filesize

    4KB

  • memory/3772-196-0x0000000003750000-0x0000000003751000-memory.dmp
    Filesize

    4KB

  • memory/4000-24-0x00000000037C0000-0x00000000037C1000-memory.dmp
    Filesize

    4KB

  • memory/4000-23-0x0000000002F00000-0x0000000002F01000-memory.dmp
    Filesize

    4KB

  • memory/4000-22-0x0000000002F00000-0x0000000002F01000-memory.dmp
    Filesize

    4KB

  • memory/4028-192-0x0000000000000000-mapping.dmp
  • memory/4028-17-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/4028-16-0x0000000002D70000-0x0000000002D71000-memory.dmp
    Filesize

    4KB