Analysis
-
max time kernel
600s -
max time network
451s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/05/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
GoldenEye.zip
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
GoldenEye.exe
Resource
win11-20240419-en
General
-
Target
GoldenEye.exe
-
Size
444KB
-
MD5
b9fc6e3e01054e805e0d9c06057e9ea6
-
SHA1
02d5867cc43677fcb636faa6dbd87b83dbabe2e7
-
SHA256
91efbbac5cbe753836ee1d898fed959cc7974b84f057a22251fe10fbfd3d426c
-
SHA512
6b1fe8d2e678dae1402584d67c2fb03472d678d72182ee130f24701ac709886ae2db91916ee45c87df9e3444310315eb14cd2a0607b222f130882d00b8f1c365
-
SSDEEP
12288:CF2itC7rxZjmoXuaiHi/Xy3I3sBmy1CLoMavDVv17:4HSZqoXuWPzloMaht7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GoldenEye.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths GoldenEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe = "0" GoldenEye.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3752 powershell.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Sets file execution options in registry 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe GoldenEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "\"cmd.exe\",\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe\"" GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe GoldenEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe GoldenEye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths GoldenEye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions GoldenEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe = "0" GoldenEye.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Qwe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\GoldenEye.exe" GoldenEye.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GoldenEye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1474490143-3221292397-4168103503-1000\{7318E800-EFE3-4853-8152-489ADEFB947B} explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe 2340 GoldenEye.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2340 GoldenEye.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 2340 GoldenEye.exe Token: SeRestorePrivilege 2340 GoldenEye.exe Token: SeShutdownPrivilege 4876 explorer.exe Token: SeCreatePagefilePrivilege 4876 explorer.exe Token: SeShutdownPrivilege 4876 explorer.exe Token: SeCreatePagefilePrivilege 4876 explorer.exe Token: SeDebugPrivilege 3752 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2312 2340 GoldenEye.exe 79 PID 2340 wrote to memory of 2312 2340 GoldenEye.exe 79 PID 2340 wrote to memory of 3752 2340 GoldenEye.exe 82 PID 2340 wrote to memory of 3752 2340 GoldenEye.exe 82 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System GoldenEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" GoldenEye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" GoldenEye.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe"C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe"1⤵
- UAC bypass
- Windows security bypass
- Sets file execution options in registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2340 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /tn "GoogleUpdateTaskMachineUK" /sc MINUTE /mo 1 /tr "C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe" /rl HIGHEST /f2⤵PID:2312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\GoldenEye.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4876
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82