Analysis
-
max time kernel
62s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe
-
Size
344KB
-
MD5
8e52242e91a530a4021b0ca52aee479e
-
SHA1
cba7f3538c9151ca21515f7e141f251f2fcd1d86
-
SHA256
bb5a4136908637a00bbdace4e90c5883e6f283891cafc998f14f886975ff08e9
-
SHA512
553b7e42457dac8547343fa26c6fa2d97f6618c51718a9deeab13b4f9a13cebb04c9e77acb186b244d7f216740947fff2ff65583d72974f6bf636eeb7afe2946
-
SSDEEP
3072:mEGh0o/lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGNlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F08022C-B085-4a8e-987E-2374DF74321F} 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F08022C-B085-4a8e-987E-2374DF74321F}\stubpath = "C:\\Windows\\{9F08022C-B085-4a8e-987E-2374DF74321F}.exe" 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED6703CB-F5F5-4893-866E-7051975A7298} {9F08022C-B085-4a8e-987E-2374DF74321F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C28DDFFE-0E8F-4e47-9168-054072F31730}\stubpath = "C:\\Windows\\{C28DDFFE-0E8F-4e47-9168-054072F31730}.exe" {ED6703CB-F5F5-4893-866E-7051975A7298}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB} {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}\stubpath = "C:\\Windows\\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe" {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A53D3E21-4AC0-402b-BC60-A694C66A4013} {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED6703CB-F5F5-4893-866E-7051975A7298}\stubpath = "C:\\Windows\\{ED6703CB-F5F5-4893-866E-7051975A7298}.exe" {9F08022C-B085-4a8e-987E-2374DF74321F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C28DDFFE-0E8F-4e47-9168-054072F31730} {ED6703CB-F5F5-4893-866E-7051975A7298}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A53D3E21-4AC0-402b-BC60-A694C66A4013}\stubpath = "C:\\Windows\\{A53D3E21-4AC0-402b-BC60-A694C66A4013}.exe" {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe -
Executes dropped EXE 5 IoCs
pid Process 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 1860 BackgroundTransferHost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{9F08022C-B085-4a8e-987E-2374DF74321F}.exe 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe File created C:\Windows\{ED6703CB-F5F5-4893-866E-7051975A7298}.exe {9F08022C-B085-4a8e-987E-2374DF74321F}.exe File created C:\Windows\{C28DDFFE-0E8F-4e47-9168-054072F31730}.exe {ED6703CB-F5F5-4893-866E-7051975A7298}.exe File created C:\Windows\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe File created C:\Windows\{A53D3E21-4AC0-402b-BC60-A694C66A4013}.exe {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe Token: SeIncBasePriorityPrivilege 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe Token: SeIncBasePriorityPrivilege 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe Token: SeIncBasePriorityPrivilege 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe Token: SeIncBasePriorityPrivilege 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3876 wrote to memory of 1224 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 101 PID 3876 wrote to memory of 1224 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 101 PID 3876 wrote to memory of 1224 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 101 PID 3876 wrote to memory of 3796 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 100 PID 3876 wrote to memory of 3796 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 100 PID 3876 wrote to memory of 3796 3876 2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe 100 PID 1224 wrote to memory of 3540 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 103 PID 1224 wrote to memory of 3540 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 103 PID 1224 wrote to memory of 3540 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 103 PID 1224 wrote to memory of 2928 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 102 PID 1224 wrote to memory of 2928 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 102 PID 1224 wrote to memory of 2928 1224 {9F08022C-B085-4a8e-987E-2374DF74321F}.exe 102 PID 3540 wrote to memory of 4492 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 107 PID 3540 wrote to memory of 4492 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 107 PID 3540 wrote to memory of 4492 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 107 PID 3540 wrote to memory of 2588 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 106 PID 3540 wrote to memory of 2588 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 106 PID 3540 wrote to memory of 2588 3540 {ED6703CB-F5F5-4893-866E-7051975A7298}.exe 106 PID 4492 wrote to memory of 2328 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 109 PID 4492 wrote to memory of 2328 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 109 PID 4492 wrote to memory of 2328 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 109 PID 4492 wrote to memory of 4156 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 108 PID 4492 wrote to memory of 4156 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 108 PID 4492 wrote to memory of 4156 4492 {C28DDFFE-0E8F-4e47-9168-054072F31730}.exe 108 PID 2328 wrote to memory of 1860 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 123 PID 2328 wrote to memory of 1860 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 123 PID 2328 wrote to memory of 1860 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 123 PID 2328 wrote to memory of 1212 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 118 PID 2328 wrote to memory of 1212 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 118 PID 2328 wrote to memory of 1212 2328 {FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_8e52242e91a530a4021b0ca52aee479e_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3796
-
-
C:\Windows\{9F08022C-B085-4a8e-987E-2374DF74321F}.exeC:\Windows\{9F08022C-B085-4a8e-987E-2374DF74321F}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9F080~1.EXE > nul3⤵PID:2928
-
-
C:\Windows\{ED6703CB-F5F5-4893-866E-7051975A7298}.exeC:\Windows\{ED6703CB-F5F5-4893-866E-7051975A7298}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ED670~1.EXE > nul4⤵PID:2588
-
-
C:\Windows\{C28DDFFE-0E8F-4e47-9168-054072F31730}.exeC:\Windows\{C28DDFFE-0E8F-4e47-9168-054072F31730}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C28DD~1.EXE > nul5⤵PID:4156
-
-
C:\Windows\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exeC:\Windows\{FDF1E2F7-0B9E-4535-A02F-CE8DD75640DB}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FDF1E~1.EXE > nul6⤵PID:1212
-
-
C:\Windows\{A53D3E21-4AC0-402b-BC60-A694C66A4013}.exeC:\Windows\{A53D3E21-4AC0-402b-BC60-A694C66A4013}.exe6⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A53D3~1.EXE > nul7⤵PID:1104
-
-
C:\Windows\{0BE28B87-BA51-49d5-A395-100EEAE77D7C}.exeC:\Windows\{0BE28B87-BA51-49d5-A395-100EEAE77D7C}.exe7⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BE28~1.EXE > nul8⤵PID:4636
-
-
C:\Windows\{EBBDC8A6-7109-4922-8A4E-0895A6408BA8}.exeC:\Windows\{EBBDC8A6-7109-4922-8A4E-0895A6408BA8}.exe8⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EBBDC~1.EXE > nul9⤵PID:1212
-
-
C:\Windows\{EA15E5A2-C21B-44cb-8EDB-13FF31E11656}.exeC:\Windows\{EA15E5A2-C21B-44cb-8EDB-13FF31E11656}.exe9⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA15E~1.EXE > nul10⤵PID:3184
-
-
C:\Windows\{7D9F77AF-8BAA-40ee-8547-F6149F335C4D}.exeC:\Windows\{7D9F77AF-8BAA-40ee-8547-F6149F335C4D}.exe10⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D9F7~1.EXE > nul11⤵PID:4132
-
-
C:\Windows\{5AD8FAF4-CCBE-45e9-AC3D-361B41AE3D95}.exeC:\Windows\{5AD8FAF4-CCBE-45e9-AC3D-361B41AE3D95}.exe11⤵PID:4248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5AD8F~1.EXE > nul12⤵PID:2820
-
-
C:\Windows\{C82F1130-9C5D-4acb-A872-933DD719718B}.exeC:\Windows\{C82F1130-9C5D-4acb-A872-933DD719718B}.exe12⤵PID:3568
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
- Executes dropped EXE
PID:1860