Analysis
-
max time kernel
63s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe
-
Size
168KB
-
MD5
c74e824c11fb8fb076621521ff5e7810
-
SHA1
b999ad9e4844b74c6c7aae0603445691be7efda7
-
SHA256
a5c05979836b92f3ce3e865567a3a267c92de6694bd97b1afdf7308f5bfc9cd4
-
SHA512
fa4ff4c81b771aa4db7608f5c4191e4f13ca0d1e0af4da273fb61487236f089ad762ac2a9ca5c4e29b9601a943ecd2c9440d0c340d0567c6ca374454a1d073f6
-
SSDEEP
1536:1EGh0o5lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o5lqOPOe2MUVg3Ve+rX
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}\stubpath = "C:\\Windows\\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe" {26A8200F-D701-4048-8B95-96A91299ACDC}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2DFBAEE0-801F-48be-8EBC-AFC669A88008} {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825} {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}\stubpath = "C:\\Windows\\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe" {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD8F59E7-1115-4044-B45D-117B382ADF6D} {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD8F59E7-1115-4044-B45D-117B382ADF6D}\stubpath = "C:\\Windows\\{CD8F59E7-1115-4044-B45D-117B382ADF6D}.exe" {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26A8200F-D701-4048-8B95-96A91299ACDC}\stubpath = "C:\\Windows\\{26A8200F-D701-4048-8B95-96A91299ACDC}.exe" 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C} {26A8200F-D701-4048-8B95-96A91299ACDC}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2DFBAEE0-801F-48be-8EBC-AFC669A88008}\stubpath = "C:\\Windows\\{2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe" {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{26A8200F-D701-4048-8B95-96A91299ACDC} 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe -
Executes dropped EXE 5 IoCs
pid Process 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 5092 {CD8F59E7-1115-4044-B45D-117B382ADF6D}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{26A8200F-D701-4048-8B95-96A91299ACDC}.exe 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe File created C:\Windows\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe {26A8200F-D701-4048-8B95-96A91299ACDC}.exe File created C:\Windows\{2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe File created C:\Windows\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe File created C:\Windows\{CD8F59E7-1115-4044-B45D-117B382ADF6D}.exe {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe Token: SeIncBasePriorityPrivilege 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe Token: SeIncBasePriorityPrivilege 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe Token: SeIncBasePriorityPrivilege 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe Token: SeIncBasePriorityPrivilege 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2332 wrote to memory of 736 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 96 PID 2332 wrote to memory of 736 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 96 PID 2332 wrote to memory of 736 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 96 PID 2332 wrote to memory of 4656 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 95 PID 2332 wrote to memory of 4656 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 95 PID 2332 wrote to memory of 4656 2332 2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe 95 PID 736 wrote to memory of 2892 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 101 PID 736 wrote to memory of 2892 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 101 PID 736 wrote to memory of 2892 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 101 PID 736 wrote to memory of 4208 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 100 PID 736 wrote to memory of 4208 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 100 PID 736 wrote to memory of 4208 736 {26A8200F-D701-4048-8B95-96A91299ACDC}.exe 100 PID 2892 wrote to memory of 3480 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 103 PID 2892 wrote to memory of 3480 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 103 PID 2892 wrote to memory of 3480 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 103 PID 2892 wrote to memory of 3420 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 104 PID 2892 wrote to memory of 3420 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 104 PID 2892 wrote to memory of 3420 2892 {C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe 104 PID 3480 wrote to memory of 1420 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 107 PID 3480 wrote to memory of 1420 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 107 PID 3480 wrote to memory of 1420 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 107 PID 3480 wrote to memory of 976 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 106 PID 3480 wrote to memory of 976 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 106 PID 3480 wrote to memory of 976 3480 {2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe 106 PID 1420 wrote to memory of 5092 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 109 PID 1420 wrote to memory of 5092 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 109 PID 1420 wrote to memory of 5092 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 109 PID 1420 wrote to memory of 4128 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 108 PID 1420 wrote to memory of 4128 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 108 PID 1420 wrote to memory of 4128 1420 {05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_c74e824c11fb8fb076621521ff5e7810_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:4656
-
-
C:\Windows\{26A8200F-D701-4048-8B95-96A91299ACDC}.exeC:\Windows\{26A8200F-D701-4048-8B95-96A91299ACDC}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{26A82~1.EXE > nul3⤵PID:4208
-
-
C:\Windows\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exeC:\Windows\{C5B8655A-B93D-464c-8010-D4CDA7C2AA2C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\{2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exeC:\Windows\{2DFBAEE0-801F-48be-8EBC-AFC669A88008}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DFBA~1.EXE > nul5⤵PID:976
-
-
C:\Windows\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exeC:\Windows\{05FB391B-3CD9-4d0e-9BB5-43B8FD8E4825}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{05FB3~1.EXE > nul6⤵PID:4128
-
-
C:\Windows\{CD8F59E7-1115-4044-B45D-117B382ADF6D}.exeC:\Windows\{CD8F59E7-1115-4044-B45D-117B382ADF6D}.exe6⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CD8F5~1.EXE > nul7⤵PID:4052
-
-
C:\Windows\{E1C7A2B0-3E3C-4684-8990-67B35C19393C}.exeC:\Windows\{E1C7A2B0-3E3C-4684-8990-67B35C19393C}.exe7⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1C7A~1.EXE > nul8⤵PID:2892
-
-
C:\Windows\{242A211C-BE77-478b-B9AA-3780B47C47B9}.exeC:\Windows\{242A211C-BE77-478b-B9AA-3780B47C47B9}.exe8⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{242A2~1.EXE > nul9⤵PID:2568
-
-
C:\Windows\{8C86E675-FFB4-414a-B61B-2F55545B2A00}.exeC:\Windows\{8C86E675-FFB4-414a-B61B-2F55545B2A00}.exe9⤵PID:2932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8C86E~1.EXE > nul10⤵PID:3536
-
-
C:\Windows\{A860EFD8-33E6-4893-B8B6-C6EB1DAB1547}.exeC:\Windows\{A860EFD8-33E6-4893-B8B6-C6EB1DAB1547}.exe10⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A860E~1.EXE > nul11⤵PID:4968
-
-
C:\Windows\{3D49FBDB-E6AB-4eb9-BC97-21EDFBF6BEF8}.exeC:\Windows\{3D49FBDB-E6AB-4eb9-BC97-21EDFBF6BEF8}.exe11⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3D49F~1.EXE > nul12⤵PID:4408
-
-
C:\Windows\{E6F03F40-F371-4ff0-8BCF-1A1ED7A9FED2}.exeC:\Windows\{E6F03F40-F371-4ff0-8BCF-1A1ED7A9FED2}.exe12⤵PID:936
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C5B86~1.EXE > nul4⤵PID:3420
-
-
-