File name:

GoldenEye.exe

Full analysis: https://app.any.run/tasks/90dfb3fb-4a6c-45b6-9e25-81ded690e93b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 08, 2025, 18:36:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
goldeneye
ransomware
stealer
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

E3B7D39BE5E821B59636D0FE7C2944CC

SHA1:

00479A97E415E9B6A5DFB5D04F5D9244BC8FBE88

SHA256:

389A7D395492C2DA6F8ABF5A8A7C49C3482F7844F77FE681808C71E961BCAE97

SSDEEP:

3072:iTAjnioLO7WpLyLNZMcPSK7BaZ0NwAWMGc0HfmY4KsyyOiy12KJ3I4YgTl5:i6nrD0ZMcPBAL7c0fTHs+2sYXg3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • cacls.exe (PID: 536)
    • GOLDENEYE mutex has been found

      • cacls.exe (PID: 536)
    • Renames files like ransomware

      • cacls.exe (PID: 536)
    • XORed URL has been found (YARA)

      • cacls.exe (PID: 536)
    • Steals credentials from Web Browsers

      • cacls.exe (PID: 536)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GoldenEye.exe (PID: 6572)
    • Process drops legitimate windows executable

      • GoldenEye.exe (PID: 6572)
  • INFO

    • Reads the machine GUID from the registry

      • GoldenEye.exe (PID: 6572)
      • cacls.exe (PID: 536)
    • Checks supported languages

      • GoldenEye.exe (PID: 6572)
      • cacls.exe (PID: 536)
    • Reads the computer name

      • GoldenEye.exe (PID: 6572)
    • The sample compiled with english language support

      • GoldenEye.exe (PID: 6572)
    • Creates files or folders in the user directory

      • GoldenEye.exe (PID: 6572)
    • Manual execution by a user

      • notepad.exe (PID: 5064)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 5064)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5384)
      • OpenWith.exe (PID: 4784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(536) cacls.exe
Decrypted-URLs (1)https://www.torproject.org/
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:06:18 21:01:49+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 194560
InitializedDataSize: 75264
UninitializedDataSize: -
EntryPoint: 0xc424
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start goldeneye.exe sppextcomobj.exe no specs #XOR-URL cacls.exe notepad.exe no specs openwith.exe no specs openwith.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
536"C:\Users\admin\AppData\Roaming\{f69b44d5-4ade-42fc-8a1d-1540b9c51835}\cacls.exe"C:\Users\admin\AppData\Roaming\{f69b44d5-4ade-42fc-8a1d-1540b9c51835}\cacls.exe
GoldenEye.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\roaming\{f69b44d5-4ade-42fc-8a1d-1540b9c51835}\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
xor-url
(PID) Process(536) cacls.exe
Decrypted-URLs (1)https://www.torproject.org/
4776C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
4784C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5064"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXTC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5384C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6572"C:\Users\admin\AppData\Local\Temp\GoldenEye.exe" C:\Users\admin\AppData\Local\Temp\GoldenEye.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\goldeneye.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
8 586
Read events
8 586
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
1 093
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
6572GoldenEye.exeC:\Users\admin\AppData\Roaming\{f69b44d5-4ade-42fc-8a1d-1540b9c51835}\RCXC95D.tmpexecutable
MD5:3F20F75A04F44058419722E1F2D6477A
SHA256:000F6810AE0A3B941958A862E39E18F5C386B7D97DA7E6ED45422793E2D9E503
536cacls.exeC:\Users\Public\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:CB267A7D4DDAF1A8A498FAD036ACC901
SHA256:7B53FAC04B6A6FA339A06EF63F285CB6A20890B875C432A6B4CF6CA5E0960C90
536cacls.exeC:\Users\admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:CB267A7D4DDAF1A8A498FAD036ACC901
SHA256:7B53FAC04B6A6FA339A06EF63F285CB6A20890B875C432A6B4CF6CA5E0960C90
536cacls.exeC:\Users\admin\Pictures\germanbrown.jpgbinary
MD5:B85720748BA82EC3D2B4157D6BBE708B
SHA256:23445FF1C5F516667701E10A4380A4AE528668ADF63070ADEB58B334D90AE5D1
536cacls.exeC:\Users\admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Building Blocks\1033\TM02835233[[fn=Text Sidebar (Annual Report Red and Black design)]].docxbinary
MD5:2617FE25E3D72CB4D238B22E56B6F634
SHA256:B8076AF72E524CB16B9126B21ECD1F28AA878F17A3BE3BB7A041B99419BD24E9
536cacls.exeC:\Users\admin\AppData\Roaming\Microsoft\Templates\Welcome to Word.docx.upxaEXzMbinary
MD5:0E96D8F2ED79AF2775701CB4712816A5
SHA256:D8CA04AB52333D2C92E79A3B1868C227A200715631D03BA6ED164E8B2E08F193
536cacls.exeC:\Users\admin\AppData\Roaming\Microsoft\Templates\Welcome to Word.docxbinary
MD5:0E96D8F2ED79AF2775701CB4712816A5
SHA256:D8CA04AB52333D2C92E79A3B1868C227A200715631D03BA6ED164E8B2E08F193
536cacls.exeC:\Users\admin\Pictures\effectrights.jpgbinary
MD5:48FCECDA31A4334A44122FA885B26EF7
SHA256:DBE300B281E6FFB488B015733B6FF97EAD272580B7090B3122D0F4FDFF20C95E
536cacls.exeC:\Users\admin\Pictures\footballclosed.jpg.upxaEXzMbinary
MD5:EB1E8456389DE6028DE9BF1DE571B1D3
SHA256:A0D09ABCE900B8C3A3E7F372925FCFD4E42222F9BE4DE5C556781B13DDFA7187
536cacls.exeC:\Users\admin\YOUR_FILES_ARE_ENCRYPTED.TXTtext
MD5:CB267A7D4DDAF1A8A498FAD036ACC901
SHA256:7B53FAC04B6A6FA339A06EF63F285CB6A20890B875C432A6B4CF6CA5E0960C90
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1164
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1164
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1164
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1164
SIHClient.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.20
  • 20.190.160.67
  • 40.126.32.134
  • 20.190.160.5
  • 40.126.32.140
  • 20.190.160.3
  • 20.190.160.2
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 23.219.150.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info