Analysis
-
max time kernel
63s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe
-
Size
408KB
-
MD5
74cffa8e517ec3c7672c00fef2b24451
-
SHA1
07d735726514e8efbcf637f054483113bb53010a
-
SHA256
7f54746215b76151e25a466b5393b969fa68df6e72b144da557d99dc2b76bb6c
-
SHA512
19538f0e05d024c9435fc8030e9bb0c1b9e0104efc2ecd0900cb164fb58a5a0ae3fd4b9d0489d82856263bd7a6cefddf113988728bd1898ff5cab651260f0df4
-
SSDEEP
3072:CEGh0ofl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGdldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A} 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}\stubpath = "C:\\Windows\\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe" 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110} {706C198F-F8C9-4010-A908-24D108C865B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090} {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}\stubpath = "C:\\Windows\\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe" {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{706C198F-F8C9-4010-A908-24D108C865B1} {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{706C198F-F8C9-4010-A908-24D108C865B1}\stubpath = "C:\\Windows\\{706C198F-F8C9-4010-A908-24D108C865B1}.exe" {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}\stubpath = "C:\\Windows\\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe" {706C198F-F8C9-4010-A908-24D108C865B1}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C} {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}\stubpath = "C:\\Windows\\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe" {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe -
Executes dropped EXE 5 IoCs
pid Process 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 5040 {8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe File created C:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exe {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe File created C:\Windows\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe {706C198F-F8C9-4010-A908-24D108C865B1}.exe File created C:\Windows\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe File created C:\Windows\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe Token: SeIncBasePriorityPrivilege 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe Token: SeIncBasePriorityPrivilege 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe Token: SeIncBasePriorityPrivilege 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe Token: SeIncBasePriorityPrivilege 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 540 wrote to memory of 3564 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 99 PID 540 wrote to memory of 3564 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 99 PID 540 wrote to memory of 3564 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 99 PID 540 wrote to memory of 1132 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 98 PID 540 wrote to memory of 1132 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 98 PID 540 wrote to memory of 1132 540 2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe 98 PID 3564 wrote to memory of 3180 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 103 PID 3564 wrote to memory of 3180 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 103 PID 3564 wrote to memory of 3180 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 103 PID 3564 wrote to memory of 3020 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 102 PID 3564 wrote to memory of 3020 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 102 PID 3564 wrote to memory of 3020 3564 {CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe 102 PID 3180 wrote to memory of 2436 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 107 PID 3180 wrote to memory of 2436 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 107 PID 3180 wrote to memory of 2436 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 107 PID 3180 wrote to memory of 3116 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 106 PID 3180 wrote to memory of 3116 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 106 PID 3180 wrote to memory of 3116 3180 {706C198F-F8C9-4010-A908-24D108C865B1}.exe 106 PID 2436 wrote to memory of 2016 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 110 PID 2436 wrote to memory of 2016 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 110 PID 2436 wrote to memory of 2016 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 110 PID 2436 wrote to memory of 1416 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 109 PID 2436 wrote to memory of 1416 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 109 PID 2436 wrote to memory of 1416 2436 {C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe 109 PID 2016 wrote to memory of 5040 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 112 PID 2016 wrote to memory of 5040 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 112 PID 2016 wrote to memory of 5040 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 112 PID 2016 wrote to memory of 1036 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 111 PID 2016 wrote to memory of 1036 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 111 PID 2016 wrote to memory of 1036 2016 {3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1132
-
-
C:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exeC:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CE3F4~1.EXE > nul3⤵PID:3020
-
-
C:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exeC:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{706C1~1.EXE > nul4⤵PID:3116
-
-
C:\Windows\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exeC:\Windows\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5C19~1.EXE > nul5⤵PID:1416
-
-
C:\Windows\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exeC:\Windows\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E096~1.EXE > nul6⤵PID:1036
-
-
C:\Windows\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exeC:\Windows\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe6⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B3E5~1.EXE > nul7⤵PID:2192
-
-
C:\Windows\{3917639C-0CA6-47bc-B31C-D1EAF0A8603E}.exeC:\Windows\{3917639C-0CA6-47bc-B31C-D1EAF0A8603E}.exe7⤵PID:1048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39176~1.EXE > nul8⤵PID:4156
-
-
C:\Windows\{63631619-B103-45f3-BF95-BD2549696656}.exeC:\Windows\{63631619-B103-45f3-BF95-BD2549696656}.exe8⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{63631~1.EXE > nul9⤵PID:4908
-
-
C:\Windows\{8DCC02C7-04CB-4463-992D-E2A9B5122D66}.exeC:\Windows\{8DCC02C7-04CB-4463-992D-E2A9B5122D66}.exe9⤵PID:1524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DCC0~1.EXE > nul10⤵PID:1512
-
-
C:\Windows\{0741249F-EDBE-4e39-A63C-3023CD14BD77}.exeC:\Windows\{0741249F-EDBE-4e39-A63C-3023CD14BD77}.exe10⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{07412~1.EXE > nul11⤵PID:3844
-
-
C:\Windows\{DBDF7005-B347-4de8-BA8A-204724D14FEF}.exeC:\Windows\{DBDF7005-B347-4de8-BA8A-204724D14FEF}.exe11⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DBDF7~1.EXE > nul12⤵PID:720
-
-
C:\Windows\{C99EB621-FBCD-4332-8CDB-6889EF325B44}.exeC:\Windows\{C99EB621-FBCD-4332-8CDB-6889EF325B44}.exe12⤵PID:3680
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5acfd8005dc3b3a4dac6523b86c1ede2b
SHA1d57616dee638fbe87926f3bdfbb432d4364c03f4
SHA2563ec4b4e8f3b1ce0598e5af89cb035b495f3a837e55a8f2c9d31509b06ae8e29f
SHA512aca51b5712fe4e4cda91d67c911e441adac350f24397e5191978e5dcb8c15c16b6094b496be99dbe9498d9508c2d43273482aa85ad57ae603439c196025170ed
-
Filesize
408KB
MD5936e4f734c43f69ec374844a1726e9a0
SHA1db238966d0ea1c265c3d5d0b409411f729981979
SHA256cd477c7063f6df607d5e63e23372a1bc01fda5861fdb76f9f1a4626352ce1fb1
SHA5125410205ccf7042eb24b8dd26f5962dbf54aaf6fa55b181ffb7d66ef32102a77804c8aaa1d2c78b667eb3914ac425f9d006c1b4fe23d840f89653014b8387566e
-
Filesize
408KB
MD59c0e8d1c6e95fb30f3210b9a1e0d712d
SHA166f243d82bc5b07b29a5909e3dee681fca96fa86
SHA256599d9248d7abe3425f2b9263afdbefc28e8d4b026a9f8d385be1dad204e6867b
SHA51237cb4eb150e45f678cd4d86e3d788ae4501fe8be6ecd9f08640ea43fccf1f867a764da4365f5fe5741fab81fbfd16e6ba4d04248a6df1c3306c659677a912920