Analysis

  • max time kernel
    82s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 05:38

General

  • Target

    2024-01-01_14e0c9254abadff1f8238982d37e3bc7_goldeneye.exe

  • Size

    180KB

  • MD5

    14e0c9254abadff1f8238982d37e3bc7

  • SHA1

    638842b03f60f5be7c705358147cc241bb02ed88

  • SHA256

    a7dacd6d6b24081b3ce19ab686f3926475e9168f0358641b2852789ea9c7f19b

  • SHA512

    7be9cb8bacd6b32d66b6f9541ca5fb9369fe0be845368fb780e40bc41bb3de2096bb6978cda9cf1a372044b3055dd1ea9f9596992b9e62eca8382f45f79fb6b7

  • SSDEEP

    3072:jEGh0oJlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGTl5eKcAEc

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 12 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_14e0c9254abadff1f8238982d37e3bc7_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_14e0c9254abadff1f8238982d37e3bc7_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:3056
    • C:\Windows\{95933809-5395-4d6a-AE22-85158949B0D2}.exe
      C:\Windows\{95933809-5395-4d6a-AE22-85158949B0D2}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\{05F3B5C9-3296-40fc-9D48-AFBADDF8FFEA}.exe
        C:\Windows\{05F3B5C9-3296-40fc-9D48-AFBADDF8FFEA}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{05F3B~1.EXE > nul
          4⤵
            PID:2756
          • C:\Windows\{ED4C49D8-2E18-4f38-A24D-FAF1A24B103C}.exe
            C:\Windows\{ED4C49D8-2E18-4f38-A24D-FAF1A24B103C}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{ED4C4~1.EXE > nul
              5⤵
                PID:2940
              • C:\Windows\{4FD3EC5F-413F-4446-8010-EB3B10E0F1A2}.exe
                C:\Windows\{4FD3EC5F-413F-4446-8010-EB3B10E0F1A2}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{4FD3E~1.EXE > nul
                  6⤵
                    PID:2728
                  • C:\Windows\{D5B6F5F7-84F2-446c-9B1F-2E31BBCA0385}.exe
                    C:\Windows\{D5B6F5F7-84F2-446c-9B1F-2E31BBCA0385}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1304
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{D5B6F~1.EXE > nul
                      7⤵
                        PID:2676
                      • C:\Windows\{1307B4D0-A72E-4601-BB4C-F8586000096C}.exe
                        C:\Windows\{1307B4D0-A72E-4601-BB4C-F8586000096C}.exe
                        7⤵
                        • Executes dropped EXE
                        PID:2708
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1307B~1.EXE > nul
                          8⤵
                            PID:2796
                          • C:\Windows\{E3DF9B92-F1E5-4912-9C66-9B142F701FEC}.exe
                            C:\Windows\{E3DF9B92-F1E5-4912-9C66-9B142F701FEC}.exe
                            8⤵
                              PID:2700
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{E3DF9~1.EXE > nul
                                9⤵
                                  PID:320
                                • C:\Windows\{A490AEF1-19D5-404f-B2EC-389D500EE2AD}.exe
                                  C:\Windows\{A490AEF1-19D5-404f-B2EC-389D500EE2AD}.exe
                                  9⤵
                                    PID:2268
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{A490A~1.EXE > nul
                                      10⤵
                                        PID:1732
                                      • C:\Windows\{AB500005-C66B-462f-B613-70E4704B7760}.exe
                                        C:\Windows\{AB500005-C66B-462f-B613-70E4704B7760}.exe
                                        10⤵
                                          PID:2320
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AB500~1.EXE > nul
                                            11⤵
                                              PID:324
                                            • C:\Windows\{F9B9947F-FC20-4571-B9C9-2B490273C77F}.exe
                                              C:\Windows\{F9B9947F-FC20-4571-B9C9-2B490273C77F}.exe
                                              11⤵
                                                PID:2312
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{95933~1.EXE > nul
                                3⤵
                                  PID:2668

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{05F3B5C9-3296-40fc-9D48-AFBADDF8FFEA}.exe

                              Filesize

                              45KB

                              MD5

                              a18a66129b948adc3edcfbd7b084e582

                              SHA1

                              0b90447faab83e9dec38fc3d7e88a8c542b571e3

                              SHA256

                              928a01e811f2aacd2c4fa4a3e9f09125d05c2f3789155b8b6fffb4d4da9bd478

                              SHA512

                              5ebd55a9dc56bd34b59a64d40a4d43e0cdfb8954309f251277263379e600c3882691d08658ebd1c22fa562b6f9535c9c5961ce65f88976bfa434c8596e433e4d

                            • C:\Windows\{05F3B5C9-3296-40fc-9D48-AFBADDF8FFEA}.exe

                              Filesize

                              15KB

                              MD5

                              a9041535e9dad98236fb7046db64c8ea

                              SHA1

                              d7502c4b6e2f09997de980f0a8edefd6e5ef180e

                              SHA256

                              f3ce0212912bb439ae7fcf9217b9036bf8c30e140970756d2572baad899cf788

                              SHA512

                              6cb3e9fd0e4c56cce66a8e638bbcdf46c620537c3abb341e08064fdc041ca32e184aa766edde9e28342b4fccd05c5c4d8d3bc824503883c4ae05a7302f381488

                            • C:\Windows\{1307B4D0-A72E-4601-BB4C-F8586000096C}.exe

                              Filesize

                              24KB

                              MD5

                              3a3a9466998b1b093ecddb7c0900abe4

                              SHA1

                              ead810f6aa16046b93392ef1ae13b0431963f212

                              SHA256

                              a82babae0ec76eed313064132b68ebb196d69624370ef03acc8a11c110f783ac

                              SHA512

                              feca37b8cdfef2a297cbd9a023ab82dfaa6a2d147c1bf50543750f64663ba3abd76cf69bb36fdb38906f39b2e8c6aa9b9052e6bc45a3d42e9d92ca70da943719

                            • C:\Windows\{4FD3EC5F-413F-4446-8010-EB3B10E0F1A2}.exe

                              Filesize

                              28KB

                              MD5

                              c32231a5937ae5f88d6cc36bc0aae149

                              SHA1

                              f3c2d1d0a8df7e11b6b3e96314721f75b5110ce8

                              SHA256

                              a1d33b6448720b3281f1773de67a6aeb8b7c6b256b8f032aad1394d649533e50

                              SHA512

                              934d3f381bd72ec54a48a83afec5cc03fc055659c4f516333e5c065688ef9e75e0e7f22aad37482b02edf0df5be0f5df567e796bab36320bc20d3e2c697833ce

                            • C:\Windows\{4FD3EC5F-413F-4446-8010-EB3B10E0F1A2}.exe

                              Filesize

                              48KB

                              MD5

                              3ae340774fbaa20a798688cb96b30bc7

                              SHA1

                              39d8a2218ce946242d2245e3955a99401b187ca9

                              SHA256

                              9da3f9e117c5cc23a3e9d8d5a970523806825e7e4560e8cbdf9c0bd63d7b46ce

                              SHA512

                              e37715419b5d5d046613b6a4171984349498b13e697f968eb0f0b923362e0341857983b7c57025cfc2f2dbb2bca1d8d106ab55974921d070a714993bf1cd8c8d

                            • C:\Windows\{95933809-5395-4d6a-AE22-85158949B0D2}.exe

                              Filesize

                              9KB

                              MD5

                              9f0921e0092c27261e1830c3b7d93ce0

                              SHA1

                              8f0adf7b50751be9216897203f8934e558157976

                              SHA256

                              f168c4256da769bfdce2e01816ac126c7661f47c4a5b18274a072e4129efb625

                              SHA512

                              d3a93e3824aa30a2d48043fe4d48ea149d39b58226316d144fdd0f0e0d6138304ad4630c14b2b0c0e6ef562605b09ca177a37ecf01fe1a16a9cb05376ba24cb2

                            • C:\Windows\{95933809-5395-4d6a-AE22-85158949B0D2}.exe

                              Filesize

                              20KB

                              MD5

                              c57d44814e0cac6e01b441a5c41fcd12

                              SHA1

                              d99dcb5f06104d417a9e0b7202480cc7133f2ab2

                              SHA256

                              ccf30c09c4cdb8d8c3e2bd55154cbe2bbbbb48c93e5d43cc1088a2251368fbd4

                              SHA512

                              6b649177b8b97719d68eeda9c73957076b5725e2da88e45f4470abf1baf4a6bd59b52ec23b06496d8cf8696f033a9f8ed65091d9ab685d317651809a946e949a

                            • C:\Windows\{A490AEF1-19D5-404f-B2EC-389D500EE2AD}.exe

                              Filesize

                              13KB

                              MD5

                              cc4f6e4ff2c3c093d7cf00adb09c0137

                              SHA1

                              95835d8f8e643ab46faf9637c3c8054a52de3490

                              SHA256

                              e53a9f186894f69a40380711b687e6670b19d0f781167a98973d9aa31e4fa7be

                              SHA512

                              5b431b76b9224ed56f2e206776d11a2703187d40a8d631a1cc74a8fc4abd8f4763d5f241e34e20017b5d40b32900bcd26495ef0c96e7b4734922afe96db03fe9

                            • C:\Windows\{A490AEF1-19D5-404f-B2EC-389D500EE2AD}.exe

                              Filesize

                              5KB

                              MD5

                              00867a7d504be5fb031101c2050f9bb9

                              SHA1

                              1e2cdeba51e41d81713eba021b269fc0c7f4530b

                              SHA256

                              229c08cf8ea1198e9827ec146a8ef445e2d0a1eccb1358ea8953e82bd7536a60

                              SHA512

                              aa2ca57eccf9c8f2113051ee0371e20c3f03f4927c822a05ea87da16b23be0ad2c4d0872ef00c610f9b8909f7d539f4ce0c9a64c4edac0a6c9d90fef89417f5f

                            • C:\Windows\{AB500005-C66B-462f-B613-70E4704B7760}.exe

                              Filesize

                              57KB

                              MD5

                              9f09c387d3a450454c7977be841e016f

                              SHA1

                              f9ce30170fff71a87c454ed51ed4d020f0d15270

                              SHA256

                              7386e15c381891bb0e0ff20f177599de0aca6bf156941f72b4dff1f09e913489

                              SHA512

                              e8dc80db36ef7bfc9d7bb058379a8c45a0a5236dbd870924c7d3c8caf162336a79fa8d96792595eea674d839706579db1723cf21fd94a6109fbecc5549580230

                            • C:\Windows\{AB500005-C66B-462f-B613-70E4704B7760}.exe

                              Filesize

                              32KB

                              MD5

                              0b5e15c5ef069d12354044d1ee6c0a6f

                              SHA1

                              ec33a08d1ff7755e4c5e352c4031724e65b07e82

                              SHA256

                              ce3fcac52ea4bc47c207a29a2ac46a43e0f3672a75656e51aaee29be48ff52d3

                              SHA512

                              d609b497b427ca4c31cc4da9194827236d1d538ccfab88152ce78a9078c6098631887e489ed058e5376d4978ecb67cbbf9e841bf5f64e4269121d39020a8d0c3

                            • C:\Windows\{E3DF9B92-F1E5-4912-9C66-9B142F701FEC}.exe

                              Filesize

                              26KB

                              MD5

                              4fbc08fdaf75035006e3aaa64c7000b7

                              SHA1

                              385122ebe2ad18784cbd6f88169b68c6825c5bc0

                              SHA256

                              36bc84d2fd72bb91a1b6de9c1a02dce4e539b300e8510016227a67d08e335aa0

                              SHA512

                              f2fad915a8ea1ce6e0811ad05c64101fdae9a3fea7d19798a5224648e0dc823a2c35a1a84fb56a8c237e4360a180bc4520ab58217126b61ca631332b9705f35a

                            • C:\Windows\{E3DF9B92-F1E5-4912-9C66-9B142F701FEC}.exe

                              Filesize

                              8KB

                              MD5

                              51e0e4aebae8d5991855fc2e084a700f

                              SHA1

                              30e6d9600a772d80cfc647bb27b1b2a8aa0deea1

                              SHA256

                              88cd4f5dd62e24c6c6b3453a7681332c1f1796ac6a0ef8a6f677900863319c47

                              SHA512

                              4eeb4a1d0d28f75a1e14acf43990bef4ca0f926aac27b72302c0afdc1fece3a181a0fcac8cae641d533c990d0a9b11e8a867dc41a940c58bd483f840b58eb95b

                            • C:\Windows\{ED4C49D8-2E18-4f38-A24D-FAF1A24B103C}.exe

                              Filesize

                              1KB

                              MD5

                              4bc0c8a9188ba80b6b1d123f1538b01c

                              SHA1

                              f970f1d1eb981593f5dce6c92a843c45a5c93db2

                              SHA256

                              8d808b2a37d78acca7fb3cf18ce2a6c378433f6f09a1700955074eec9d0673ec

                              SHA512

                              c9ee2ff3915c0df23c16a774bcd2e4a8584e4d938b10e998e95e7095975d88c825c7d1d681916823e64f9076d739769afadff629f6aa608e4e14a41b9d5b5bd4

                            • C:\Windows\{ED4C49D8-2E18-4f38-A24D-FAF1A24B103C}.exe

                              Filesize

                              57KB

                              MD5

                              828847a4f8cd9f11a2c580cb1a642264

                              SHA1

                              235c4d3ee6666721e48b3a4b00d07379c5c0b4e8

                              SHA256

                              96409579a4d7a2611af55caccb5a10e04504486b064891d3f4c4c42859f3ab2e

                              SHA512

                              948460051e493ac15a785a526c60fc27a74e5d864051d5300ebe486b858e90b5cbdc38bced9f421499b3359aedccebfd7d4331503a01cbca1a3fc9b14f6db3a4

                            • C:\Windows\{F9B9947F-FC20-4571-B9C9-2B490273C77F}.exe

                              Filesize

                              7KB

                              MD5

                              07c6aeb010a172e2e420e54a31c092bc

                              SHA1

                              da517c871f47f2d5c65c7b506ec16c7ce056c87f

                              SHA256

                              ea8c1b825302325da66d75ba724884c6490e3613cc68784a2b559b6e4e2beef6

                              SHA512

                              c6df703c94c904d9edb86e46b659c39602dc532335be5f583885d66893092bfeab10b85e9c73a7dae85bbf37bd08e0690c6502b2a584cc3406da134a8c124bc7