Analysis
-
max time kernel
88s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
-
Size
192KB
-
MD5
5d64cea0bb702716f9855520bea944b0
-
SHA1
f67b195390c2962748cd4d7dbe0853ea20ef640d
-
SHA256
186f78be381757c893468cec815620a2b16bfcc1840ee853e7ed6256a66769b8
-
SHA512
ae7328c9534a6b2adb76a176ab6b2ee912a7c0960271f383bf85da2915341bb3294f55c7488995d7fe46880386fb3ec3719832629dde4d5b11ca18012f49b633
-
SSDEEP
1536:1EGh0otl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0otl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7} {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41EE3842-4B9C-49a2-9A70-5F058013B5D2} {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}\stubpath = "C:\\Windows\\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe" {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}\stubpath = "C:\\Windows\\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe" {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}\stubpath = "C:\\Windows\\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe" {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0AEED0E-DA93-4715-9E39-196434C0D488}\stubpath = "C:\\Windows\\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exe" {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D58F7CF5-456E-4630-B17C-678B762D25E3}\stubpath = "C:\\Windows\\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exe" 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C} {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A0AEED0E-DA93-4715-9E39-196434C0D488} {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B} {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}\stubpath = "C:\\Windows\\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe" {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D58F7CF5-456E-4630-B17C-678B762D25E3} 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBA566CF-C9B5-4765-A27B-44A17C415D32} {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FBA566CF-C9B5-4765-A27B-44A17C415D32}\stubpath = "C:\\Windows\\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe" {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe -
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 2636 {6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe File created C:\Windows\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe File created C:\Windows\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe File created C:\Windows\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe File created C:\Windows\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe File created C:\Windows\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exe {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe File created C:\Windows\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Token: SeIncBasePriorityPrivilege 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe Token: SeIncBasePriorityPrivilege 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe Token: SeIncBasePriorityPrivilege 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe Token: SeIncBasePriorityPrivilege 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe Token: SeIncBasePriorityPrivilege 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe Token: SeIncBasePriorityPrivilege 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2316 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 28 PID 2196 wrote to memory of 2316 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 28 PID 2196 wrote to memory of 2316 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 28 PID 2196 wrote to memory of 2316 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 28 PID 2196 wrote to memory of 1704 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 29 PID 2196 wrote to memory of 1704 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 29 PID 2196 wrote to memory of 1704 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 29 PID 2196 wrote to memory of 1704 2196 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 29 PID 2316 wrote to memory of 2604 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 31 PID 2316 wrote to memory of 2604 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 31 PID 2316 wrote to memory of 2604 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 31 PID 2316 wrote to memory of 2604 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 31 PID 2316 wrote to memory of 2724 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 30 PID 2316 wrote to memory of 2724 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 30 PID 2316 wrote to memory of 2724 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 30 PID 2316 wrote to memory of 2724 2316 {D58F7CF5-456E-4630-B17C-678B762D25E3}.exe 30 PID 2604 wrote to memory of 3052 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 33 PID 2604 wrote to memory of 3052 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 33 PID 2604 wrote to memory of 3052 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 33 PID 2604 wrote to memory of 3052 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 33 PID 2604 wrote to memory of 2776 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 32 PID 2604 wrote to memory of 2776 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 32 PID 2604 wrote to memory of 2776 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 32 PID 2604 wrote to memory of 2776 2604 {8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe 32 PID 3052 wrote to memory of 2532 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 37 PID 3052 wrote to memory of 2532 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 37 PID 3052 wrote to memory of 2532 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 37 PID 3052 wrote to memory of 2532 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 37 PID 3052 wrote to memory of 2960 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 36 PID 3052 wrote to memory of 2960 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 36 PID 3052 wrote to memory of 2960 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 36 PID 3052 wrote to memory of 2960 3052 {41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe 36 PID 2532 wrote to memory of 1080 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 38 PID 2532 wrote to memory of 1080 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 38 PID 2532 wrote to memory of 1080 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 38 PID 2532 wrote to memory of 1080 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 38 PID 2532 wrote to memory of 2720 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 39 PID 2532 wrote to memory of 2720 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 39 PID 2532 wrote to memory of 2720 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 39 PID 2532 wrote to memory of 2720 2532 {FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe 39 PID 1080 wrote to memory of 1256 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 41 PID 1080 wrote to memory of 1256 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 41 PID 1080 wrote to memory of 1256 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 41 PID 1080 wrote to memory of 1256 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 41 PID 1080 wrote to memory of 2684 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 40 PID 1080 wrote to memory of 2684 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 40 PID 1080 wrote to memory of 2684 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 40 PID 1080 wrote to memory of 2684 1080 {B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe 40 PID 1256 wrote to memory of 2636 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 43 PID 1256 wrote to memory of 2636 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 43 PID 1256 wrote to memory of 2636 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 43 PID 1256 wrote to memory of 2636 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 43 PID 1256 wrote to memory of 2556 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 42 PID 1256 wrote to memory of 2556 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 42 PID 1256 wrote to memory of 2556 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 42 PID 1256 wrote to memory of 2556 1256 {A0AEED0E-DA93-4715-9E39-196434C0D488}.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exeC:\Windows\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D58F7~1.EXE > nul3⤵PID:2724
-
-
C:\Windows\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exeC:\Windows\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8730A~1.EXE > nul4⤵PID:2776
-
-
C:\Windows\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exeC:\Windows\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41EE3~1.EXE > nul5⤵PID:2960
-
-
C:\Windows\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exeC:\Windows\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exeC:\Windows\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B023D~1.EXE > nul7⤵PID:2684
-
-
C:\Windows\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exeC:\Windows\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A0AEE~1.EXE > nul8⤵PID:2556
-
-
C:\Windows\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exeC:\Windows\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe8⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67213~1.EXE > nul9⤵PID:1220
-
-
C:\Windows\{72A57095-2420-4238-8E26-7EC8EE77A2CC}.exeC:\Windows\{72A57095-2420-4238-8E26-7EC8EE77A2CC}.exe9⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72A57~1.EXE > nul10⤵PID:1716
-
-
C:\Windows\{E08F8192-2B73-4ece-A68B-7E56EE98EAB4}.exeC:\Windows\{E08F8192-2B73-4ece-A68B-7E56EE98EAB4}.exe10⤵PID:816
-
C:\Windows\{B24593BB-2181-4920-9148-62117A9E2B77}.exeC:\Windows\{B24593BB-2181-4920-9148-62117A9E2B77}.exe11⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B2459~1.EXE > nul12⤵PID:620
-
-
C:\Windows\{360D823E-CE54-4b62-9D30-78C33E6F9DFE}.exeC:\Windows\{360D823E-CE54-4b62-9D30-78C33E6F9DFE}.exe12⤵PID:588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E08F8~1.EXE > nul11⤵PID:488
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FBA56~1.EXE > nul6⤵PID:2720
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD586ceed8b1a720453969a6316ab2beb28
SHA1ebe0614e787fde76c3ac3d8460e13acf671d0705
SHA256d9087b44989f128203d14f322191c092d84cf628433a22a87692f3f8b6f90e69
SHA512b76c49bdfb93c8ff5721dd0bdd30aaad6730a537e30bfc8c8b782c6ca98eff4ec3ff15163b20f7a00bc3468f6f7ac6cc44654479788aa0edc9024443a99e5116
-
Filesize
192KB
MD5d6c3031303d9a3d84b00e1d1c99a0e45
SHA1f5225faa5c8643566dad3ecd99017c04fb4bf686
SHA2569e8308ab26d57ac1a961d947d068970de1fab18a972e122fd0a62844227a9e1a
SHA512ba632eb29a769e5b5598ea406d7902fbfd198b61cc9d857196379db8e9d84e0a552d0861845ecb5d3430ea2f2b8d05a73223c31e38d1333f2d4de0a7330f0e10