Analysis
-
max time kernel
63s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe
-
Size
180KB
-
MD5
a1843772c6eab003d13513225d35f1b1
-
SHA1
f18ec4a1d112485dcd24dabf04fd0a53bb11b3ba
-
SHA256
510347b4687e4cc53e1bee9fedb6d5be85a9133f6ddabeda6d6cd5383504f0dd
-
SHA512
663b1b4637f861786cd303820aa81fd26ca3c7a943986d673d4ed3c813ed9d72764625496cd766d2372f1c74a176df4ac5980d06e11399e3ad2d272cb9a3a9f6
-
SSDEEP
3072:jEGh0orlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG1l5eKcAEc
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010B1505-7C56-4ea9-A995-4AD333177BBE} {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{010B1505-7C56-4ea9-A995-4AD333177BBE}\stubpath = "C:\\Windows\\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe" {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B} 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C} {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3289768-8F90-4d26-9CAB-1D466AADC6FA} {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}\stubpath = "C:\\Windows\\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe" {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4} {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}\stubpath = "C:\\Windows\\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe" {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}\stubpath = "C:\\Windows\\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe" 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}\stubpath = "C:\\Windows\\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe" {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe -
Executes dropped EXE 5 IoCs
pid Process 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 3616 {010B1505-7C56-4ea9-A995-4AD333177BBE}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe File created C:\Windows\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe File created C:\Windows\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe File created C:\Windows\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe File created C:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe Token: SeIncBasePriorityPrivilege 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe Token: SeIncBasePriorityPrivilege 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe Token: SeIncBasePriorityPrivilege 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe Token: SeIncBasePriorityPrivilege 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3672 wrote to memory of 596 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 99 PID 3672 wrote to memory of 596 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 99 PID 3672 wrote to memory of 596 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 99 PID 3672 wrote to memory of 2896 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 96 PID 3672 wrote to memory of 2896 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 96 PID 3672 wrote to memory of 2896 3672 2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe 96 PID 596 wrote to memory of 556 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 101 PID 596 wrote to memory of 556 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 101 PID 596 wrote to memory of 556 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 101 PID 596 wrote to memory of 3208 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 100 PID 596 wrote to memory of 3208 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 100 PID 596 wrote to memory of 3208 596 {FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe 100 PID 556 wrote to memory of 1780 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 107 PID 556 wrote to memory of 1780 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 107 PID 556 wrote to memory of 1780 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 107 PID 556 wrote to memory of 3448 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 106 PID 556 wrote to memory of 3448 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 106 PID 556 wrote to memory of 3448 556 {41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe 106 PID 1780 wrote to memory of 2184 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 109 PID 1780 wrote to memory of 2184 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 109 PID 1780 wrote to memory of 2184 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 109 PID 1780 wrote to memory of 3888 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 108 PID 1780 wrote to memory of 3888 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 108 PID 1780 wrote to memory of 3888 1780 {B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe 108 PID 2184 wrote to memory of 3616 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 112 PID 2184 wrote to memory of 3616 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 112 PID 2184 wrote to memory of 3616 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 112 PID 2184 wrote to memory of 5004 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 111 PID 2184 wrote to memory of 5004 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 111 PID 2184 wrote to memory of 5004 2184 {739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2896
-
-
C:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exeC:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC75E~1.EXE > nul3⤵PID:3208
-
-
C:\Windows\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exeC:\Windows\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{41EE1~1.EXE > nul4⤵PID:3448
-
-
C:\Windows\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exeC:\Windows\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B3289~1.EXE > nul5⤵PID:3888
-
-
C:\Windows\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exeC:\Windows\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{739C2~1.EXE > nul6⤵PID:5004
-
-
C:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exeC:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe6⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\{038C59E2-DBC6-4e37-8615-95D54FFBE281}.exeC:\Windows\{038C59E2-DBC6-4e37-8615-95D54FFBE281}.exe7⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{038C5~1.EXE > nul8⤵PID:5116
-
-
C:\Windows\{93357928-0FDF-4fec-B7DF-CA604F809471}.exeC:\Windows\{93357928-0FDF-4fec-B7DF-CA604F809471}.exe8⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{93357~1.EXE > nul9⤵PID:820
-
-
C:\Windows\{E6701E90-5717-4325-BECF-55D4FF66D92D}.exeC:\Windows\{E6701E90-5717-4325-BECF-55D4FF66D92D}.exe9⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E6701~1.EXE > nul10⤵PID:3852
-
-
C:\Windows\{7C229429-690D-48ee-87EF-CFB314E079FA}.exeC:\Windows\{7C229429-690D-48ee-87EF-CFB314E079FA}.exe10⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C229~1.EXE > nul11⤵PID:1496
-
-
C:\Windows\{4B533170-8D3F-46b8-8332-92E9687A6BB3}.exeC:\Windows\{4B533170-8D3F-46b8-8332-92E9687A6BB3}.exe11⤵PID:5040
-
C:\Windows\{65855BDA-5517-496a-976D-2291BA1B48CD}.exeC:\Windows\{65855BDA-5517-496a-976D-2291BA1B48CD}.exe12⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4B533~1.EXE > nul12⤵PID:1284
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{010B1~1.EXE > nul7⤵PID:2856
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5ac2eb5eb3496932f928890d4a18e109d
SHA183bee97cc094ec7c37531e0e61e5ef2508c7a202
SHA2569795a19a5f1cfcb00a478fdce5a772bcba72cbbe19ba85b71f6ba2a31adece89
SHA5121b9eed2f9f33eb05acd0b787defeb57455f3fadb8eed20de50227273d2ecb7585504fd9c4d86bb9a9ac0a9c3e303d6cd010dc5b2762ebe2ead18d455360f9bbe
-
Filesize
180KB
MD5458cd699634240f2ac058c187ef891af
SHA1e8e590c1f4719f1d7e8eec7c39a2912dbef4f594
SHA256b22f0f89c8f52f1c1ddda0a715d56752cb9a5a533860f42d806e74e286733f46
SHA51215f332353e7e18af4a579f17240163a8debb043a4e180840e5eb85a0d8eac04ee41859345c14affdee0a80baef757a9e9ff502869b09d23c7f982fd0cda6a8a6
-
Filesize
180KB
MD50d571b23768e1725beb44b85e67d6254
SHA1a77e0628f59803fc77c56b4ffa65eab363c03f37
SHA256bebec18c916e100d4378adbfd7cf638977cd502eaeea8456a515378dfe3ee084
SHA51237379289f8302a20c851c9cfeca08e246503a8771ad9c50cb502c7eb6d7540c54494587703759de6029fdcd3174001b510d7046de9c5f609748480f20fa59d8a