Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 19:34 UTC

General

  • Target

    2024-09-21_c0066adcba3177d1669a40d3bb466b8e_goldeneye.exe

  • Size

    372KB

  • MD5

    c0066adcba3177d1669a40d3bb466b8e

  • SHA1

    40cac1419753c933779664d4388c91c1eaa7911a

  • SHA256

    b3e99e8bd2d66b47b2b4fdfa363cfe389b8777db99b5b65ca0fc6cfcddae25db

  • SHA512

    0c6c6cbb4f76b80baf1d2764843a97ef83652d7df2772b72abbe3fa4dd1397c6c42f2fafee03ba73aff8bf2d946ff00240b83e1f81f6ad3d4e35c6b4c9fa5483

  • SSDEEP

    3072:CEGh0owmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGXl/Oe2MUVg3vTeKcAEciTBqr3

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-21_c0066adcba3177d1669a40d3bb466b8e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-21_c0066adcba3177d1669a40d3bb466b8e_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\{74C90102-BF69-4e7f-AA5D-34793ACD6C87}.exe
      C:\Windows\{74C90102-BF69-4e7f-AA5D-34793ACD6C87}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\{0A842675-FAF7-412d-8484-3A636C688B78}.exe
        C:\Windows\{0A842675-FAF7-412d-8484-3A636C688B78}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\{504CB968-5C68-4ae9-A71B-3D200CC0906C}.exe
          C:\Windows\{504CB968-5C68-4ae9-A71B-3D200CC0906C}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3144
          • C:\Windows\{5360BAEA-A439-4640-90C8-2FCCED15C055}.exe
            C:\Windows\{5360BAEA-A439-4640-90C8-2FCCED15C055}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2456
            • C:\Windows\{E4114BE3-43B1-4508-937F-F58CCCE78CFD}.exe
              C:\Windows\{E4114BE3-43B1-4508-937F-F58CCCE78CFD}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1196
              • C:\Windows\{0B2BE85E-998F-42ba-AD72-5EB1DDB83DB7}.exe
                C:\Windows\{0B2BE85E-998F-42ba-AD72-5EB1DDB83DB7}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3676
                • C:\Windows\{5438E157-915F-49ac-8347-169D79BE77FF}.exe
                  C:\Windows\{5438E157-915F-49ac-8347-169D79BE77FF}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1880
                  • C:\Windows\{0443E21F-5A5A-4515-A247-F34D85669A6E}.exe
                    C:\Windows\{0443E21F-5A5A-4515-A247-F34D85669A6E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2012
                    • C:\Windows\{07073F25-6461-467a-8FB9-F282A40D9782}.exe
                      C:\Windows\{07073F25-6461-467a-8FB9-F282A40D9782}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2264
                      • C:\Windows\{B8CAEE1C-E29F-4e88-9CF1-D8AFE26C1379}.exe
                        C:\Windows\{B8CAEE1C-E29F-4e88-9CF1-D8AFE26C1379}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1904
                        • C:\Windows\{EC64199C-0CA8-4e30-916E-4FFAD4BC3A53}.exe
                          C:\Windows\{EC64199C-0CA8-4e30-916E-4FFAD4BC3A53}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3976
                          • C:\Windows\{2CCF0F2F-66ED-4246-9D8E-938B111267E1}.exe
                            C:\Windows\{2CCF0F2F-66ED-4246-9D8E-938B111267E1}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3852
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{EC641~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:4648
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B8CAE~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4876
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{07073~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:4308
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{0443E~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:4344
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{5438E~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1176
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{0B2BE~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4488
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{E4114~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2780
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{5360B~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4532
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{504CB~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:964
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{0A842~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:916
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{74C90~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1948
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2628

Network

  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    36.56.20.217.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    36.56.20.217.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    68.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    56.163.245.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    56.163.245.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    36.56.20.217.in-addr.arpa
    dns
    71 B
    131 B
    1
    1

    DNS Request

    36.56.20.217.in-addr.arpa

  • 8.8.8.8:53
    68.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    68.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    56.163.245.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    56.163.245.4.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{0443E21F-5A5A-4515-A247-F34D85669A6E}.exe

    Filesize

    372KB

    MD5

    3ad60d647aa50fd103ec9b245f114ef4

    SHA1

    b91daf8a4be28b2af85680bfb86c522cfb51a336

    SHA256

    04b9929daf4ef94f6528cfa8a069fd811c83b8bacdae7e29083092bc5ee2878e

    SHA512

    a4f3f99cdc89e218628a416ca7f800f4953846643cb25a6f128970f9c8844959112fef8b11acc1c8aaa8524a96a709b81eda66ba7103856ca216a57281004acd

  • C:\Windows\{07073F25-6461-467a-8FB9-F282A40D9782}.exe

    Filesize

    372KB

    MD5

    77e4af389e91670a0c46650c99086170

    SHA1

    cb05351864d9942275d5bb29dea6a48033435404

    SHA256

    9cc89392c3accca84a746ec98e29810708951d069d7f5e7b2c2eb5d6b25e7c23

    SHA512

    f131c1616975361f212079e045f6558e2dae7d3cf084227bf0a0973b60eb0c611c954813ff50815b15d65f9ac6338fdc584966a8048df62bf6fceb5b12bc2549

  • C:\Windows\{0A842675-FAF7-412d-8484-3A636C688B78}.exe

    Filesize

    372KB

    MD5

    fba5ef736580a8b298cb1d326f76ce74

    SHA1

    1abfd68a1c4b7bd91a21c17a59f7e374b967b883

    SHA256

    0fd16cf55b679608c848ad457eb9c314b7cbdeac7601fcfbf7fc91cc99080d8f

    SHA512

    b5cf2770a242e07b24925183f7edec942cda26da64f97875d00137e3dbc1e41d9b84046c46eab3b5651d9ab9231a9906f75b45f3d015b5c5facd7793862ab336

  • C:\Windows\{0B2BE85E-998F-42ba-AD72-5EB1DDB83DB7}.exe

    Filesize

    372KB

    MD5

    96f8273190a763e991b09daa68ff2a27

    SHA1

    4bd0d71d593a69d7f1dbd25d0064bc4a3a532104

    SHA256

    539bdf1535c4ccd739790867d6c66e71d8f3844fc2e548031c5c97d8cba9ef81

    SHA512

    30abfea1faeea053e9188ecd2bd2ff8138704e321b6175453f364b8d5b7f75bed6a6ca287eec875903fe453eabfa7ce9c8a29b3ae587bee7bf0cae13c679ea0a

  • C:\Windows\{2CCF0F2F-66ED-4246-9D8E-938B111267E1}.exe

    Filesize

    372KB

    MD5

    c1441ac5acc185bf0505bb380723a3a6

    SHA1

    2768e9c1d5429d1a2fdeff96d3a65d10127ae533

    SHA256

    eee0c30d8da9a74ba62109a073a2c99c519144637c66a2ab2a3c41ff110384eb

    SHA512

    d2e2c9e9f6818b143180433ff057df9910179552afef1b93e1611e0921e5fc85aa604a11c6f6ca874b13dbbda29c887d6eb162803d7a47da3e66f252f99f3c90

  • C:\Windows\{504CB968-5C68-4ae9-A71B-3D200CC0906C}.exe

    Filesize

    372KB

    MD5

    61a364ccd72715ad1cc5bde94f1075de

    SHA1

    e7514d8e8677fcbb49257b0cdd73f59ef35441b6

    SHA256

    ba02f4887acaf6793b21966577e3163f6751b172ff2339975e3afccd630ba513

    SHA512

    3349f3a366acd1fad6d4b9c9b0925729a970ff6d67001851bb07f348cad711dc486038c707cfb66138a82547d564efe5ccc889af8d44d82e9f2536c0d91fdd67

  • C:\Windows\{5360BAEA-A439-4640-90C8-2FCCED15C055}.exe

    Filesize

    372KB

    MD5

    f0a53cbd5304722e0cf33bc633fb2de7

    SHA1

    261bccd911afa23e9f3fa968ff1cc1ffc817cb17

    SHA256

    37d3be179b983e3553e4b0a5b3e3ebd4aea245d1b4bdd8cf61da94b699310ba7

    SHA512

    933801630817014e367435abb7193bd25f1644ac2c0cd7af81025c754c7de3ca582b84c4f7ab2ecf3fb3eeaa8e718e214f3b7da46d9115bada5b731c06ce82af

  • C:\Windows\{5438E157-915F-49ac-8347-169D79BE77FF}.exe

    Filesize

    372KB

    MD5

    4aaf6781396a5917d92cea4774fb90dd

    SHA1

    7719c61a1578e2b67e763718a3dc30f963162b26

    SHA256

    e73afd9b58acd285da74688846034e7343efcd66d10e0ac5adf309c1d4e10816

    SHA512

    4c159fedc26143107c9548bc4d4e50c06eaa1e64a91894d313089b315bc0558bfe5233196e6b3fab8796342076279936471320b02728e83b973c6014b686e8a6

  • C:\Windows\{74C90102-BF69-4e7f-AA5D-34793ACD6C87}.exe

    Filesize

    372KB

    MD5

    5687b4bc9d4a56596eacdb5c792d9faa

    SHA1

    e2b81216e1d0656dea1cf84489519e031b7d475c

    SHA256

    68cb623e74c4c09e720e8f57fdbd9c482363c50e3a6f74cc18539146f71d3587

    SHA512

    33bfb1eaf87c187cff6caeb28dcc208acc1fd3cd3545a059a7cee0f2ca113d817f8430e5c73dd99ff90fe491b9ba9c40ac4c05bf840a2abec3116e99c9ed4828

  • C:\Windows\{E4114BE3-43B1-4508-937F-F58CCCE78CFD}.exe

    Filesize

    372KB

    MD5

    1a14dd3e46fe3d147a67433be0d00727

    SHA1

    dc76a5bdcc2048ec3ed1a80e60100f05a80a60b7

    SHA256

    2a627b6e2627631c2f1ea54e179777c74b9b4504a9bd333b07a2c631b4bd54b4

    SHA512

    6ce2acc16c40c31d0355e0ff6e3993813bb1d6738aba6531dc194a4c2e695b69a757b8d364b4a17c9b17c45c58c409413473d44ab36cafccd24055985c72b528

  • C:\Windows\{EC64199C-0CA8-4e30-916E-4FFAD4BC3A53}.exe

    Filesize

    372KB

    MD5

    ac37c06125493e42cd56402b02898eb7

    SHA1

    fd3accd99305bfd44bfd85d0aa105d2c5db6a9ca

    SHA256

    4c389c7ad643d739c1849e16e6eae5ab1f4e6e63b6266df2fed8998165ba675c

    SHA512

    72f81c9da679a36a9ccc2a5512cb74dcd03a8bc2d92bce004f0b1ee8b83cbb090263099c3e1c915a2b0f91111767ccfdd73ca2f51ce7bd38c0f6abf5a12592ef

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.