Analysis
-
max time kernel
63s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe
-
Size
168KB
-
MD5
7ca8f6856853c54a4f751d760a78cabe
-
SHA1
2f21e6f3c492c07aac5c3f7a537fdd2c8ee89690
-
SHA256
004771383e5aa8a23891f40d671b3a7770ed74bb0fa6c15b341cebcb2213809f
-
SHA512
146a722bc02a50c06194b6359b8ad8fe62dc4fec7284de54c5613993079d2447376c0f69500db239324a284acaf2763ea89f82430d3e60c5925e363c6613d72d
-
SSDEEP
1536:1EGh0oOlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oOlqOPOe2MUVg3Ve+rX
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BE7FEE3-970C-4998-9740-AFDC35DB689E} 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BE7FEE3-970C-4998-9740-AFDC35DB689E}\stubpath = "C:\\Windows\\{3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe" 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}\stubpath = "C:\\Windows\\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe" {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{911C261F-BBF7-44e5-88A9-253DE22E28B0} {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{911C261F-BBF7-44e5-88A9-253DE22E28B0}\stubpath = "C:\\Windows\\{911C261F-BBF7-44e5-88A9-253DE22E28B0}.exe" {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A} {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34499C00-A8B8-40b1-A33A-38CF71E7285A} {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34499C00-A8B8-40b1-A33A-38CF71E7285A}\stubpath = "C:\\Windows\\{34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe" {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3} {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}\stubpath = "C:\\Windows\\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe" {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe -
Executes dropped EXE 5 IoCs
pid Process 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 768 {911C261F-BBF7-44e5-88A9-253DE22E28B0}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe File created C:\Windows\{34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe File created C:\Windows\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe File created C:\Windows\{911C261F-BBF7-44e5-88A9-253DE22E28B0}.exe {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe File created C:\Windows\{3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe Token: SeIncBasePriorityPrivilege 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe Token: SeIncBasePriorityPrivilege 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe Token: SeIncBasePriorityPrivilege 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe Token: SeIncBasePriorityPrivilege 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4020 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 100 PID 1856 wrote to memory of 4020 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 100 PID 1856 wrote to memory of 4020 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 100 PID 1856 wrote to memory of 4644 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 99 PID 1856 wrote to memory of 4644 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 99 PID 1856 wrote to memory of 4644 1856 2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe 99 PID 4020 wrote to memory of 2448 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 102 PID 4020 wrote to memory of 2448 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 102 PID 4020 wrote to memory of 2448 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 102 PID 4020 wrote to memory of 4884 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 101 PID 4020 wrote to memory of 4884 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 101 PID 4020 wrote to memory of 4884 4020 {3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe 101 PID 2448 wrote to memory of 5336 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 106 PID 2448 wrote to memory of 5336 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 106 PID 2448 wrote to memory of 5336 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 106 PID 2448 wrote to memory of 4508 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 105 PID 2448 wrote to memory of 4508 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 105 PID 2448 wrote to memory of 4508 2448 {3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe 105 PID 5336 wrote to memory of 1632 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 108 PID 5336 wrote to memory of 1632 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 108 PID 5336 wrote to memory of 1632 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 108 PID 5336 wrote to memory of 5920 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 107 PID 5336 wrote to memory of 5920 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 107 PID 5336 wrote to memory of 5920 5336 {34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe 107 PID 1632 wrote to memory of 768 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 110 PID 1632 wrote to memory of 768 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 110 PID 1632 wrote to memory of 768 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 110 PID 1632 wrote to memory of 5580 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 109 PID 1632 wrote to memory of 5580 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 109 PID 1632 wrote to memory of 5580 1632 {9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_7ca8f6856853c54a4f751d760a78cabe_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4644
-
-
C:\Windows\{3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exeC:\Windows\{3BE7FEE3-970C-4998-9740-AFDC35DB689E}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3BE7F~1.EXE > nul3⤵PID:4884
-
-
C:\Windows\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exeC:\Windows\{3E220AF1-AA87-4c2d-A9B4-DA6D82EB295A}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3E220~1.EXE > nul4⤵PID:4508
-
-
C:\Windows\{34499C00-A8B8-40b1-A33A-38CF71E7285A}.exeC:\Windows\{34499C00-A8B8-40b1-A33A-38CF71E7285A}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34499~1.EXE > nul5⤵PID:5920
-
-
C:\Windows\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exeC:\Windows\{9495F0DF-94B6-4c66-A2EF-7922C7DF7FA3}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9495F~1.EXE > nul6⤵PID:5580
-
-
C:\Windows\{911C261F-BBF7-44e5-88A9-253DE22E28B0}.exeC:\Windows\{911C261F-BBF7-44e5-88A9-253DE22E28B0}.exe6⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{911C2~1.EXE > nul7⤵PID:4844
-
-
C:\Windows\{09FBFD29-2D9E-4472-9880-3CC71C93C53D}.exeC:\Windows\{09FBFD29-2D9E-4472-9880-3CC71C93C53D}.exe7⤵PID:5404
-
C:\Windows\{0B89059B-E88C-45e8-B277-34CA3B2E5F05}.exeC:\Windows\{0B89059B-E88C-45e8-B277-34CA3B2E5F05}.exe8⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0B890~1.EXE > nul9⤵PID:5672
-
-
C:\Windows\{CDE3A081-C35A-4050-A27C-D7E60876923C}.exeC:\Windows\{CDE3A081-C35A-4050-A27C-D7E60876923C}.exe9⤵PID:860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CDE3A~1.EXE > nul10⤵PID:6060
-
-
C:\Windows\{0C1224DB-67F0-49bf-A351-2EC92020810D}.exeC:\Windows\{0C1224DB-67F0-49bf-A351-2EC92020810D}.exe10⤵PID:2960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C122~1.EXE > nul11⤵PID:5140
-
-
C:\Windows\{DC4F37CB-1466-4c5c-B889-255322024E63}.exeC:\Windows\{DC4F37CB-1466-4c5c-B889-255322024E63}.exe11⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC4F3~1.EXE > nul12⤵PID:2028
-
-
C:\Windows\{E8384FF0-3BC4-4f67-97FD-742E6F180FB7}.exeC:\Windows\{E8384FF0-3BC4-4f67-97FD-742E6F180FB7}.exe12⤵PID:5564
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{09FBF~1.EXE > nul8⤵PID:2220
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD575a40410191547e2b2ae9366e667905c
SHA15f181ce8847be38d02f06d3f222f907d3dfdc4b7
SHA256ce8f69f58e90e7b15ba451ec7c3b1dad00bb84b0eae6025c741da7f7cff67604
SHA512fe5f601d435ff0b73f99047de95ae227f9f74facf3518f12fe669b5212e482cc40b9876263dca687cbf16794038f1fbd2db98c319882ba9f8b894bbd05ce4094
-
Filesize
92KB
MD5fab7b7176fad4b1368d68c2277cddcf4
SHA1c7753d5a126cbdcca6b6d689823f4e5a0bf312d9
SHA256fb800582bfbeeb53b1d32fadca82587d4991bfb850a17a1e1677eab2b7d19a6f
SHA512cb5b4c8fd3beed76c1e3f28ed7e03749c4bb951179d66171abcd0ab55745766bfa59eb3ba9e93184219661d5e01c49615c25da54241e02da9f8647d1e67f7ca9
-
Filesize
93KB
MD5aa93cd2fd1496d4e1834308202e17c0f
SHA13fe7489de4eb0e5434b880d616b317862c5b7a4b
SHA256eff429b82fbe33b0e4af2023e1ebba09e567047846e54b43b3a942a3b450a157
SHA5122a3f3080dfeb2ee1403e8e27d37cf88b1ed243da5fa35ccdfa0f34913f6e8b0cf31a9f1355719d4ecf2d58e0fa6db8a7ee86ccaf3571e5a6008bd96a618e3212
-
Filesize
42KB
MD539943667b54cd16f075026cfa4faeb89
SHA18d627fa3d5f38288349339e996e5852d8fb2a1d4
SHA25698e048549bfddf3be6c6e00e4fccc9878fb6c02142ecdc988f179837ad3b58fb
SHA512df49271d95298ffff081dc52c60a9f85449863939122b89c5e7b9d25c79354d04da87ee82ca31c5a260d2817c26e6665c652db5fff5a2a70d14ad269f0123fbf
-
Filesize
51KB
MD5c3e625fc55c3b9d9a26cbcd3b41335b7
SHA1cc2368879b81016802988f2c8e4e605679419f9b
SHA2569d17554500b9ebcb33e94e80e15e3e00d8e1be036c803eb8f413f50bbfe3dee3
SHA512379088913e09dbbc3404bb9768b2818da83a80a85b1325869ce9c70e7e4cea61df93bdad0e107bbedd9819235fc444206a46d26a1fa8fb0e70716a492002c29a
-
Filesize
168KB
MD561396edd1fef5f56061acae7999e3c9f
SHA1f5fd94aaa2b9f3ffc6e1eba821f4765294587617
SHA256a8f0d7c7703526030bb7b416145b055863f8bc6729b8679a6d78fe953bbde5bb
SHA512bd52c2d44577ad6f4d8e356fff1be3f1ce4c1a916f7321a05efb8d9fdc4d168bc48d81ef1aacfa17d8b2e93c2d3f3d654893b176821fbad86651ff043aa08a74