File name: | GoldenEye.exe |
Full analysis: | https://app.any.run/tasks/1b5267be-3856-401c-a474-b8cc4d5728a3 |
Verdict: | Malicious activity |
Analysis date: | October 10, 2024, 16:22:00 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | E3B7D39BE5E821B59636D0FE7C2944CC |
SHA1: | 00479A97E415E9B6A5DFB5D04F5D9244BC8FBE88 |
SHA256: | 389A7D395492C2DA6F8ABF5A8A7C49C3482F7844F77FE681808C71E961BCAE97 |
SSDEEP: | 3072:iTAjnioLO7WpLyLNZMcPSK7BaZ0NwAWMGc0HfmY4KsyyOiy12KJ3I4YgTl5:i6nrD0ZMcPBAL7c0fTHs+2sYXg3 |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2013:06:18 21:01:49+00:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 11 |
CodeSize: | 194560 |
InitializedDataSize: | 75264 |
UninitializedDataSize: | - |
EntryPoint: | 0xc424 |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2648 | "C:\Users\admin\AppData\Roaming\{c9697d46-f45e-4c6c-9582-fbf8b2f56fb1}\Netplwiz.exe" | C:\Users\admin\AppData\Roaming\{c9697d46-f45e-4c6c-9582-fbf8b2f56fb1}\Netplwiz.exe | GoldenEye.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Advanced User Accounts Control Panel Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
xor-url(PID) Process(2648) Netplwiz.exe Decrypted-URLs (1)https://www.torproject.org/ | |||||||||||||||
5172 | "C:\Users\admin\Desktop\GoldenEye.exe" | C:\Users\admin\Desktop\GoldenEye.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
5172 | GoldenEye.exe | C:\Users\admin\AppData\Roaming\{c9697d46-f45e-4c6c-9582-fbf8b2f56fb1}\RCXC099.tmp | executable | |
MD5:6E12034A5CC8270A507F305703EAD0C7 | SHA256:5D8B42C33BAB0D35B4EBFB44F78B17173A87DD15CA5B4DED8410543A9ACBF79C | |||
2648 | Netplwiz.exe | C:\Users\admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Building Blocks\1033\TM02835233[[fn=Text Sidebar (Annual Report Red and Black design)]].docx.rVWKuUzw | binary | |
MD5:B82E425F111A26B52D30F55E43457063 | SHA256:DFCA23C2C0E49A33F7140D0DC6C70E90EEFEFECB1E5F89821F5ACAE57DA78473 | |||
2648 | Netplwiz.exe | C:\Users\admin\AppData\Roaming\Microsoft\Templates\Welcome to Word.docx.rVWKuUzw | binary | |
MD5:24CD619DB6595842F9E06E7C4F0DBB3F | SHA256:A015FEB7559FB9087EBD44ACB6F111EA11A9AA639B543B82C4B1E66BA61B655E | |||
5172 | GoldenEye.exe | C:\Users\admin\AppData\Roaming\{c9697d46-f45e-4c6c-9582-fbf8b2f56fb1}\Netplwiz.exe | executable | |
MD5:E3B7D39BE5E821B59636D0FE7C2944CC | SHA256:389A7D395492C2DA6F8ABF5A8A7C49C3482F7844F77FE681808C71E961BCAE97 | |||
2648 | Netplwiz.exe | C:\Users\admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Building Blocks\1033\TM02835233[[fn=Text Sidebar (Annual Report Red and Black design)]].docx | binary | |
MD5:B82E425F111A26B52D30F55E43457063 | SHA256:DFCA23C2C0E49A33F7140D0DC6C70E90EEFEFECB1E5F89821F5ACAE57DA78473 | |||
2648 | Netplwiz.exe | C:\Users\admin\Pictures\healthsubmitted.jpg | binary | |
MD5:6849C0246651C4704B3611E7CFB153DE | SHA256:A63E7F29F7898BC173A6CFD283010BA62148067D059469155CFA0A08860D2D3A | |||
2648 | Netplwiz.exe | C:\Users\admin\Pictures\surveysafety.jpg | binary | |
MD5:CD03BFB88103120C6640B9E7FE423EF4 | SHA256:B7648D226C1D540CD59B07C4D5E6DBFBBDF57CA0BFB46919612CCC74EA23A3D8 | |||
2648 | Netplwiz.exe | C:\Users\admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXT | text | |
MD5:910AF73BF2DE2DAFDAB5CF5E84D1152E | SHA256:EC81BCB55BC636A11E4D2DC40FCF3F9C4A8B486582BCC717A396147B0074B441 | |||
2648 | Netplwiz.exe | C:\Users\admin\Pictures\particularlyrated.jpg | binary | |
MD5:5F594AA356FFF0C258F47636A471C79A | SHA256:A87AA567E684551E5CEC0840A5306A801F04D42F68EC314A5BF425CCA9F7E696 | |||
2648 | Netplwiz.exe | C:\Users\admin\Pictures\providingball.jpg | binary | |
MD5:39053A0F5525D566500C145B595744DC | SHA256:1CC79D1E8AD683803BF05B9A3D70F6F0749A5681810E0142FC6B870BBAF3F1C9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1764 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
5488 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6944 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1764 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6944 | svchost.exe | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
6944 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5488 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1764 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |