Analysis
-
max time kernel
63s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe
-
Size
344KB
-
MD5
fe0273d10777e7b5d1f09ab73fa0ef34
-
SHA1
53538d632d7079ccac65667e9070fa2ab5228e67
-
SHA256
94f3518cba38a7b8358e7d3185200188ca2d55313b3acb30ccf95a27a5697f5d
-
SHA512
210680c3a04ebb8d57ed5f2b6d5aca188f54a874b111470728ee709b529a2d4a99a8f392605c48521b116cbb6b8d3765bc0f49c04f1980ad261ab04418dacdb2
-
SSDEEP
3072:mEGh0oWlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGUlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2} {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}\stubpath = "C:\\Windows\\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe" {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1198473B-0388-446a-9F31-7E4C32DE77F5} {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65B533C2-92CA-40f7-B3FF-405EB6138BD8} 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0} {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}\stubpath = "C:\\Windows\\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe" {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}\stubpath = "C:\\Windows\\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}.exe" {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65B533C2-92CA-40f7-B3FF-405EB6138BD8}\stubpath = "C:\\Windows\\{65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe" 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1198473B-0388-446a-9F31-7E4C32DE77F5}\stubpath = "C:\\Windows\\{1198473B-0388-446a-9F31-7E4C32DE77F5}.exe" {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B} {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe -
Executes dropped EXE 5 IoCs
pid Process 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 968 {DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe File created C:\Windows\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe File created C:\Windows\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe File created C:\Windows\{1198473B-0388-446a-9F31-7E4C32DE77F5}.exe {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe File created C:\Windows\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}.exe {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe Token: SeIncBasePriorityPrivilege 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe Token: SeIncBasePriorityPrivilege 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe Token: SeIncBasePriorityPrivilege 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe Token: SeIncBasePriorityPrivilege 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1392 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 98 PID 2008 wrote to memory of 1392 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 98 PID 2008 wrote to memory of 1392 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 98 PID 2008 wrote to memory of 1480 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 99 PID 2008 wrote to memory of 1480 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 99 PID 2008 wrote to memory of 1480 2008 2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe 99 PID 1392 wrote to memory of 1652 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 101 PID 1392 wrote to memory of 1652 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 101 PID 1392 wrote to memory of 1652 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 101 PID 1392 wrote to memory of 860 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 100 PID 1392 wrote to memory of 860 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 100 PID 1392 wrote to memory of 860 1392 {65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe 100 PID 1652 wrote to memory of 3228 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 104 PID 1652 wrote to memory of 3228 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 104 PID 1652 wrote to memory of 3228 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 104 PID 1652 wrote to memory of 3252 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 103 PID 1652 wrote to memory of 3252 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 103 PID 1652 wrote to memory of 3252 1652 {7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe 103 PID 3228 wrote to memory of 3632 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 107 PID 3228 wrote to memory of 3632 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 107 PID 3228 wrote to memory of 3632 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 107 PID 3228 wrote to memory of 2260 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 106 PID 3228 wrote to memory of 2260 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 106 PID 3228 wrote to memory of 2260 3228 {0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe 106 PID 3632 wrote to memory of 968 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 110 PID 3632 wrote to memory of 968 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 110 PID 3632 wrote to memory of 968 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 110 PID 3632 wrote to memory of 1028 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 109 PID 3632 wrote to memory of 1028 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 109 PID 3632 wrote to memory of 1028 3632 {1198473B-0388-446a-9F31-7E4C32DE77F5}.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_fe0273d10777e7b5d1f09ab73fa0ef34_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\{65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exeC:\Windows\{65B533C2-92CA-40f7-B3FF-405EB6138BD8}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{65B53~1.EXE > nul3⤵PID:860
-
-
C:\Windows\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exeC:\Windows\{7D1034A4-3EEB-470c-BEAC-97F14D1C67A0}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D103~1.EXE > nul4⤵PID:3252
-
-
C:\Windows\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exeC:\Windows\{0BBAB086-90D9-4bcc-9DC2-E4B358841AE2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0BBAB~1.EXE > nul5⤵PID:2260
-
-
C:\Windows\{1198473B-0388-446a-9F31-7E4C32DE77F5}.exeC:\Windows\{1198473B-0388-446a-9F31-7E4C32DE77F5}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{11984~1.EXE > nul6⤵PID:1028
-
-
C:\Windows\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}.exeC:\Windows\{DF43D0FF-BD8C-4a5f-A37C-2C71A875873B}.exe6⤵
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DF43D~1.EXE > nul7⤵PID:4592
-
-
C:\Windows\{6D72DB43-1C88-4f05-9D51-034606E30C4B}.exeC:\Windows\{6D72DB43-1C88-4f05-9D51-034606E30C4B}.exe7⤵PID:2544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6D72D~1.EXE > nul8⤵PID:2836
-
-
C:\Windows\{EA15171A-0507-4dc8-9CF6-F727BC274878}.exeC:\Windows\{EA15171A-0507-4dc8-9CF6-F727BC274878}.exe8⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EA151~1.EXE > nul9⤵PID:2948
-
-
C:\Windows\{EFB3F03C-7344-400a-ABD6-4FA1BA3AE0CB}.exeC:\Windows\{EFB3F03C-7344-400a-ABD6-4FA1BA3AE0CB}.exe9⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFB3F~1.EXE > nul10⤵PID:3936
-
-
C:\Windows\{6118BCCC-8855-476c-B724-601676129A44}.exeC:\Windows\{6118BCCC-8855-476c-B724-601676129A44}.exe10⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6118B~1.EXE > nul11⤵PID:3104
-
-
C:\Windows\{BCC09AF7-D514-4d01-A16B-1ECBBA6CB7D1}.exeC:\Windows\{BCC09AF7-D514-4d01-A16B-1ECBBA6CB7D1}.exe11⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BCC09~1.EXE > nul12⤵PID:3140
-
-
C:\Windows\{14B94166-B6C3-4e0b-B82B-09339F0C8A94}.exeC:\Windows\{14B94166-B6C3-4e0b-B82B-09339F0C8A94}.exe12⤵PID:1700
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1480
-