Analysis
-
max time kernel
62s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe
-
Size
380KB
-
MD5
9f6a8b3b904d564ef6cd8b11d13ca4dd
-
SHA1
973c72e3c722815ac3d38d9b9d9e719770c1d943
-
SHA256
bda4a755113cc186c03811e17299f2f0063eb2546ba0a162c3b4c09a6555c1f6
-
SHA512
bb54c85ecc438e06f269ca70ee8942f35791f8cc5f2f3b937d7f6b896a56bbd5dd9c29e20f7fc519be6511fa1b3ca1c868bc143cbaef8d5e8822b224481fdf97
-
SSDEEP
3072:mEGh0o/lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGNl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BCC4582-8097-45c0-B56F-EB01B34569DA}\stubpath = "C:\\Windows\\{1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe" {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72} {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED} 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}\stubpath = "C:\\Windows\\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe" 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1BCC4582-8097-45c0-B56F-EB01B34569DA} {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE} {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}\stubpath = "C:\\Windows\\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe" {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ECA998F8-699F-493c-BCA8-A83B0736C84D} {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ECA998F8-699F-493c-BCA8-A83B0736C84D}\stubpath = "C:\\Windows\\{ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe" {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72}\stubpath = "C:\\Windows\\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72}.exe" {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe -
Executes dropped EXE 5 IoCs
pid Process 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 3284 {3A6BA486-0737-4ae7-A40E-8ACB7C965A72}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe File created C:\Windows\{1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe File created C:\Windows\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe File created C:\Windows\{ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe File created C:\Windows\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72}.exe {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe Token: SeIncBasePriorityPrivilege 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe Token: SeIncBasePriorityPrivilege 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe Token: SeIncBasePriorityPrivilege 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe Token: SeIncBasePriorityPrivilege 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4608 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 97 PID 3444 wrote to memory of 4608 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 97 PID 3444 wrote to memory of 4608 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 97 PID 3444 wrote to memory of 4108 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 96 PID 3444 wrote to memory of 4108 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 96 PID 3444 wrote to memory of 4108 3444 2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe 96 PID 4608 wrote to memory of 2476 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 101 PID 4608 wrote to memory of 2476 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 101 PID 4608 wrote to memory of 2476 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 101 PID 4608 wrote to memory of 2616 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 100 PID 4608 wrote to memory of 2616 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 100 PID 4608 wrote to memory of 2616 4608 {DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe 100 PID 2476 wrote to memory of 232 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 105 PID 2476 wrote to memory of 232 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 105 PID 2476 wrote to memory of 232 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 105 PID 2476 wrote to memory of 4576 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 104 PID 2476 wrote to memory of 4576 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 104 PID 2476 wrote to memory of 4576 2476 {1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe 104 PID 232 wrote to memory of 1780 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 107 PID 232 wrote to memory of 1780 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 107 PID 232 wrote to memory of 1780 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 107 PID 232 wrote to memory of 3208 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 106 PID 232 wrote to memory of 3208 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 106 PID 232 wrote to memory of 3208 232 {E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe 106 PID 1780 wrote to memory of 3284 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 109 PID 1780 wrote to memory of 3284 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 109 PID 1780 wrote to memory of 3284 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 109 PID 1780 wrote to memory of 3120 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 108 PID 1780 wrote to memory of 3120 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 108 PID 1780 wrote to memory of 3120 1780 {ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_9f6a8b3b904d564ef6cd8b11d13ca4dd_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4108
-
-
C:\Windows\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exeC:\Windows\{DB1A98C6-35A8-4a62-AD5C-9EDEE21257ED}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB1A9~1.EXE > nul3⤵PID:2616
-
-
C:\Windows\{1BCC4582-8097-45c0-B56F-EB01B34569DA}.exeC:\Windows\{1BCC4582-8097-45c0-B56F-EB01B34569DA}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1BCC4~1.EXE > nul4⤵PID:4576
-
-
C:\Windows\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exeC:\Windows\{E4E49A79-6DFA-40c9-AF44-926F36AB3ADE}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E4E49~1.EXE > nul5⤵PID:3208
-
-
C:\Windows\{ECA998F8-699F-493c-BCA8-A83B0736C84D}.exeC:\Windows\{ECA998F8-699F-493c-BCA8-A83B0736C84D}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ECA99~1.EXE > nul6⤵PID:3120
-
-
C:\Windows\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72}.exeC:\Windows\{3A6BA486-0737-4ae7-A40E-8ACB7C965A72}.exe6⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\{4AAD5EA6-4520-4a02-A0FB-B6AAFF683DEB}.exeC:\Windows\{4AAD5EA6-4520-4a02-A0FB-B6AAFF683DEB}.exe7⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AAD5~1.EXE > nul8⤵PID:3884
-
-
C:\Windows\{39333866-68A7-4e01-B161-B5774AD39CEA}.exeC:\Windows\{39333866-68A7-4e01-B161-B5774AD39CEA}.exe8⤵PID:3904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39333~1.EXE > nul9⤵PID:4248
-
-
C:\Windows\{1ED93830-FAE9-4c4f-800F-C19F90D04BDB}.exeC:\Windows\{1ED93830-FAE9-4c4f-800F-C19F90D04BDB}.exe9⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1ED93~1.EXE > nul10⤵PID:1040
-
-
C:\Windows\{6818C5FE-8F16-4147-ADB7-D39BC1FEB669}.exeC:\Windows\{6818C5FE-8F16-4147-ADB7-D39BC1FEB669}.exe10⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6818C~1.EXE > nul11⤵PID:2696
-
-
C:\Windows\{E57481FC-EE39-4928-B5BC-3711B4716090}.exeC:\Windows\{E57481FC-EE39-4928-B5BC-3711B4716090}.exe11⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E5748~1.EXE > nul12⤵PID:4432
-
-
C:\Windows\{816FBADF-AD1D-4e58-9BD9-A26516A9DE64}.exeC:\Windows\{816FBADF-AD1D-4e58-9BD9-A26516A9DE64}.exe12⤵PID:5044
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A6BA~1.EXE > nul7⤵PID:4144
-
-
-
-
-
-