Analysis
-
max time kernel
88s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe
-
Size
168KB
-
MD5
3f536e06b9fcab649debde9835e259b5
-
SHA1
df768349bf602d5727ba029d92395b75e646cd6a
-
SHA256
491358089b38175d7ad09cdb120f04e5598bc3fbd5d7836e8735cf8aee002b17
-
SHA512
52decdd5f76b6a646a206c3a0d6a264c6084b2646f8da92c0fb0a091c15b4af6be2f4771479eec90e52b5a595b7b70a2db22ace836293749b7045aac9c96c78e
-
SSDEEP
1536:1EGh0oElq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oElqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF} {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}\stubpath = "C:\\Windows\\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe" {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5} {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}\stubpath = "C:\\Windows\\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe" {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6A6B91E-F190-4779-9F30-08062A205B1A}\stubpath = "C:\\Windows\\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exe" {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B8405E4-A07E-4fd2-9967-E7EE628400A6} {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1449CEFC-45C0-4674-AB48-55DE1AAC2904} {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}\stubpath = "C:\\Windows\\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe" {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}\stubpath = "C:\\Windows\\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe" {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD} 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}\stubpath = "C:\\Windows\\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe" 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3E51A998-E79C-4cdb-B049-CA6F40C2953A} {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}\stubpath = "C:\\Windows\\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe" {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6A6B91E-F190-4779-9F30-08062A205B1A} {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe -
Deletes itself 1 IoCs
pid Process 2644 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 2560 {6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exe {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe File created C:\Windows\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe File created C:\Windows\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe File created C:\Windows\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe File created C:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe File created C:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe File created C:\Windows\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe Token: SeIncBasePriorityPrivilege 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe Token: SeIncBasePriorityPrivilege 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe Token: SeIncBasePriorityPrivilege 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe Token: SeIncBasePriorityPrivilege 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe Token: SeIncBasePriorityPrivilege 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe Token: SeIncBasePriorityPrivilege 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2232 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 29 PID 2248 wrote to memory of 2232 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 29 PID 2248 wrote to memory of 2232 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 29 PID 2248 wrote to memory of 2232 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 29 PID 2248 wrote to memory of 2644 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 28 PID 2248 wrote to memory of 2644 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 28 PID 2248 wrote to memory of 2644 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 28 PID 2248 wrote to memory of 2644 2248 2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe 28 PID 2232 wrote to memory of 2568 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 31 PID 2232 wrote to memory of 2568 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 31 PID 2232 wrote to memory of 2568 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 31 PID 2232 wrote to memory of 2568 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 31 PID 2232 wrote to memory of 2656 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 30 PID 2232 wrote to memory of 2656 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 30 PID 2232 wrote to memory of 2656 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 30 PID 2232 wrote to memory of 2656 2232 {86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe 30 PID 2568 wrote to memory of 2684 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 33 PID 2568 wrote to memory of 2684 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 33 PID 2568 wrote to memory of 2684 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 33 PID 2568 wrote to memory of 2684 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 33 PID 2568 wrote to memory of 1096 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 32 PID 2568 wrote to memory of 1096 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 32 PID 2568 wrote to memory of 1096 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 32 PID 2568 wrote to memory of 1096 2568 {1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe 32 PID 2684 wrote to memory of 2516 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 37 PID 2684 wrote to memory of 2516 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 37 PID 2684 wrote to memory of 2516 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 37 PID 2684 wrote to memory of 2516 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 37 PID 2684 wrote to memory of 1084 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 36 PID 2684 wrote to memory of 1084 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 36 PID 2684 wrote to memory of 1084 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 36 PID 2684 wrote to memory of 1084 2684 {6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe 36 PID 2516 wrote to memory of 1356 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 39 PID 2516 wrote to memory of 1356 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 39 PID 2516 wrote to memory of 1356 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 39 PID 2516 wrote to memory of 1356 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 39 PID 2516 wrote to memory of 2768 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 38 PID 2516 wrote to memory of 2768 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 38 PID 2516 wrote to memory of 2768 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 38 PID 2516 wrote to memory of 2768 2516 {B6A6B91E-F190-4779-9F30-08062A205B1A}.exe 38 PID 1356 wrote to memory of 1340 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 41 PID 1356 wrote to memory of 1340 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 41 PID 1356 wrote to memory of 1340 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 41 PID 1356 wrote to memory of 1340 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 41 PID 1356 wrote to memory of 2804 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 40 PID 1356 wrote to memory of 2804 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 40 PID 1356 wrote to memory of 2804 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 40 PID 1356 wrote to memory of 2804 1356 {3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe 40 PID 1340 wrote to memory of 2560 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 43 PID 1340 wrote to memory of 2560 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 43 PID 1340 wrote to memory of 2560 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 43 PID 1340 wrote to memory of 2560 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 43 PID 1340 wrote to memory of 2836 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 42 PID 1340 wrote to memory of 2836 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 42 PID 1340 wrote to memory of 2836 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 42 PID 1340 wrote to memory of 2836 1340 {8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2644
-
-
C:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exeC:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{86F42~1.EXE > nul3⤵PID:2656
-
-
C:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exeC:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1449C~1.EXE > nul4⤵PID:1096
-
-
C:\Windows\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exeC:\Windows\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6B840~1.EXE > nul5⤵PID:1084
-
-
C:\Windows\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exeC:\Windows\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6A6B~1.EXE > nul6⤵PID:2768
-
-
C:\Windows\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exeC:\Windows\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E51A~1.EXE > nul7⤵PID:2804
-
-
C:\Windows\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exeC:\Windows\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8EE0B~1.EXE > nul8⤵PID:2836
-
-
C:\Windows\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exeC:\Windows\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe8⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6CDD6~1.EXE > nul9⤵PID:320
-
-
C:\Windows\{05B8D2A4-EE53-48fa-9C2D-378D0D49484A}.exeC:\Windows\{05B8D2A4-EE53-48fa-9C2D-378D0D49484A}.exe9⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05B8D~1.EXE > nul10⤵PID:1072
-
-
C:\Windows\{C5B843DF-FCFD-4f5c-AF36-FD0F91B8EADF}.exeC:\Windows\{C5B843DF-FCFD-4f5c-AF36-FD0F91B8EADF}.exe10⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5B84~1.EXE > nul11⤵PID:268
-
-
C:\Windows\{87E07610-0983-40ca-99CF-2DAE1141EA90}.exeC:\Windows\{87E07610-0983-40ca-99CF-2DAE1141EA90}.exe11⤵PID:2300
-
C:\Windows\{DAEAF93D-6240-4bac-8EF9-0B72B16BA44D}.exeC:\Windows\{DAEAF93D-6240-4bac-8EF9-0B72B16BA44D}.exe12⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87E07~1.EXE > nul12⤵PID:3004
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD538fe9f657abb5f66a37713900078ef41
SHA1ed6ecc015723c9a5a913ff4c260a6c81b4a88344
SHA256c896eb5d7c186b2338f242e3056f0a848bb8b70fd94fccdc9a8ccdf23d6150e6
SHA5128e843643aa9f30e122c8fae6c45720f03aec4f82a2a1894f3082055579c9a45801d7a716a83328f63a9c40208a93f78b4372daf4e4f3d97191da516e39e36da5
-
Filesize
168KB
MD54c771c30bcf3f209d0c4f7e35a7a06f2
SHA1db2f6b9928eb34260e0b85b8cecb82d389fa2a62
SHA25697c7c6a3b234c17222f437acf6e6fe4255ec542dd2034d15df64f4b89968ecd7
SHA512b562a61823ade5f4660d8a92cc8bf279b1deba43744e9131f38a90c5b6e20bd4f3a87bac06b89d22ae05d78b2414cfee5e4562f4909e4ee1da25e1c722476e32