Analysis
-
max time kernel
88s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe
-
Size
372KB
-
MD5
b14a1a57449947a1ad221f68e2905fef
-
SHA1
f3cc0e9e4cb1138d8402b8d2586dc9f8eb636b23
-
SHA256
abfdcb4b1138e3e176c36cf8dc0dbe611b90e063bbd9994b5837f02d0702c1c5
-
SHA512
392c8ba05f275a37895962b06e12cd8c6d5c1c761dd35863699cda5c8180b0dbc69981c1ca3b7490da1434ff82779917012a0599f0ae2e4df73f02a48d2a7e68
-
SSDEEP
3072:CEGh0o6mlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGVl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41} 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}\stubpath = "C:\\Windows\\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe" {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05872502-448B-4412-A7A7-19BA55288C8E}\stubpath = "C:\\Windows\\{05872502-448B-4412-A7A7-19BA55288C8E}.exe" {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0} {05872502-448B-4412-A7A7-19BA55288C8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}\stubpath = "C:\\Windows\\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe" {05872502-448B-4412-A7A7-19BA55288C8E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}\stubpath = "C:\\Windows\\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe" {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE} {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05872502-448B-4412-A7A7-19BA55288C8E} {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4EAFFE8-7852-4c82-B0A2-58650D41944F} {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6992D193-2D53-4bab-BB37-7372EBCA6BA3} {C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}\stubpath = "C:\\Windows\\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exe" {C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}\stubpath = "C:\\Windows\\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe" 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640} {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}\stubpath = "C:\\Windows\\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe" {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe -
Deletes itself 1 IoCs
pid Process 1692 cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 1196 {C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe File created C:\Windows\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe File created C:\Windows\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exe {C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe File created C:\Windows\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe File created C:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exe {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe File created C:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe {05872502-448B-4412-A7A7-19BA55288C8E}.exe File created C:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe Token: SeIncBasePriorityPrivilege 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe Token: SeIncBasePriorityPrivilege 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe Token: SeIncBasePriorityPrivilege 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe Token: SeIncBasePriorityPrivilege 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe Token: SeIncBasePriorityPrivilege 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2464 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 29 PID 1572 wrote to memory of 2464 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 29 PID 1572 wrote to memory of 2464 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 29 PID 1572 wrote to memory of 2464 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 29 PID 1572 wrote to memory of 1692 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 28 PID 1572 wrote to memory of 1692 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 28 PID 1572 wrote to memory of 1692 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 28 PID 1572 wrote to memory of 1692 1572 2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe 28 PID 2464 wrote to memory of 2784 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 31 PID 2464 wrote to memory of 2784 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 31 PID 2464 wrote to memory of 2784 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 31 PID 2464 wrote to memory of 2784 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 31 PID 2464 wrote to memory of 2688 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 30 PID 2464 wrote to memory of 2688 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 30 PID 2464 wrote to memory of 2688 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 30 PID 2464 wrote to memory of 2688 2464 {BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe 30 PID 2784 wrote to memory of 2652 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 33 PID 2784 wrote to memory of 2652 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 33 PID 2784 wrote to memory of 2652 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 33 PID 2784 wrote to memory of 2652 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 33 PID 2784 wrote to memory of 2848 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 32 PID 2784 wrote to memory of 2848 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 32 PID 2784 wrote to memory of 2848 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 32 PID 2784 wrote to memory of 2848 2784 {05872502-448B-4412-A7A7-19BA55288C8E}.exe 32 PID 2652 wrote to memory of 2976 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 37 PID 2652 wrote to memory of 2976 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 37 PID 2652 wrote to memory of 2976 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 37 PID 2652 wrote to memory of 2976 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 37 PID 2652 wrote to memory of 2372 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 36 PID 2652 wrote to memory of 2372 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 36 PID 2652 wrote to memory of 2372 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 36 PID 2652 wrote to memory of 2372 2652 {845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe 36 PID 2976 wrote to memory of 2776 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 39 PID 2976 wrote to memory of 2776 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 39 PID 2976 wrote to memory of 2776 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 39 PID 2976 wrote to memory of 2776 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 39 PID 2976 wrote to memory of 2956 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 38 PID 2976 wrote to memory of 2956 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 38 PID 2976 wrote to memory of 2956 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 38 PID 2976 wrote to memory of 2956 2976 {EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe 38 PID 2776 wrote to memory of 1196 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 41 PID 2776 wrote to memory of 1196 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 41 PID 2776 wrote to memory of 1196 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 41 PID 2776 wrote to memory of 1196 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 41 PID 2776 wrote to memory of 1744 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 40 PID 2776 wrote to memory of 1744 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 40 PID 2776 wrote to memory of 1744 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 40 PID 2776 wrote to memory of 1744 2776 {60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:1692
-
-
C:\Windows\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exeC:\Windows\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BDBE2~1.EXE > nul3⤵PID:2688
-
-
C:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exeC:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05872~1.EXE > nul4⤵PID:2848
-
-
C:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exeC:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{845D8~1.EXE > nul5⤵PID:2372
-
-
C:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exeC:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EF7E5~1.EXE > nul6⤵PID:2956
-
-
C:\Windows\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exeC:\Windows\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{60086~1.EXE > nul7⤵PID:1744
-
-
C:\Windows\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exeC:\Windows\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C4EAF~1.EXE > nul8⤵PID:1644
-
-
C:\Windows\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exeC:\Windows\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exe8⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6992D~1.EXE > nul9⤵PID:1388
-
-
C:\Windows\{997CC038-10E0-4d55-B3EF-62153C548514}.exeC:\Windows\{997CC038-10E0-4d55-B3EF-62153C548514}.exe9⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{997CC~1.EXE > nul10⤵PID:2200
-
-
C:\Windows\{5FF7743D-2971-422a-86FF-0E8061E6CF2D}.exeC:\Windows\{5FF7743D-2971-422a-86FF-0E8061E6CF2D}.exe10⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5FF77~1.EXE > nul11⤵PID:2204
-
-
C:\Windows\{F3FFF39E-CAAD-4b23-B6E7-7433FD98C614}.exeC:\Windows\{F3FFF39E-CAAD-4b23-B6E7-7433FD98C614}.exe11⤵PID:2624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F3FFF~1.EXE > nul12⤵PID:1480
-
-
C:\Windows\{586643AE-F613-41ee-8276-D502C72017EA}.exeC:\Windows\{586643AE-F613-41ee-8276-D502C72017EA}.exe12⤵PID:580
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD589a26ced15d3ecb6c3de671840ea4005
SHA1f7c2ce7754f12c556ea76c24b27a273689979275
SHA256003cf904f0b74e7282e28acbc511a618c5c5e4002be4e6467aa23661589444fa
SHA5129c5d3934c7319dbc54e219ebfea08e3bbedf1b5a3c2ac959272004d5ecdb86c33572761ef88a18e520a4cce083387e0efb9dea736d59ed8ed71079451c51a5d7
-
Filesize
372KB
MD533cb83ba285e01029a1e15196c1bfbf8
SHA1bd915f673ae9c02dc89dd38ede963c628d1891b8
SHA25661ff43c6a256c2842b688f619dcb888272909675c28a46f3d331d39001450657
SHA5120afe4a665ba5c3453888f2f069b33764865aa5c1f645dc0c2df24ca8c874d2ba88e80c43c8515162b95a0ffba2f919b94dbd60f4e8eaed6f2df9431fd18f089d
-
Filesize
372KB
MD53df803bd4307cf2af242cdb09b9636b1
SHA1406b89774ffe64f0139715321672286377489f58
SHA2562b8ed60940a0658f44760365aacdaad8bb3b8d5a8172d44231676af6a96735fe
SHA51267fb40df2a46007c7ca21ea2585f3d22a8cf1f08cb67abd6de848f07f473a5ab2b42acf21aa3a76b7aeae92ae0f399a73242e5b6e50726048df56dadefcdf800