Analysis

  • max time kernel
    82s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2024 05:42

General

  • Target

    2024-01-01_4c53b079a01a8937ff84846ed7b5391d_goldeneye.exe

  • Size

    372KB

  • MD5

    4c53b079a01a8937ff84846ed7b5391d

  • SHA1

    1091cf19f1ca9d2b09ef29846f8a5a80970503ae

  • SHA256

    df7986cdf35d8265e0c922e6755913b103b86c339e0d9d7705f903e51adf10c8

  • SHA512

    f0158edc4869e2ba2113f81ca0043a1a2acc65de4bc20a9576404ccc6c5e77b6ba4d3446fd3938ac77d8f89f499aaac1a38ed415a5d0b084d13a2bcb43c97d60

  • SSDEEP

    3072:CEGh0olmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGOl/Oe2MUVg3vTeKcAEciTBqr3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 12 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_4c53b079a01a8937ff84846ed7b5391d_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_4c53b079a01a8937ff84846ed7b5391d_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\{FAB4A0E9-D1AB-4688-9900-F5684E0A9571}.exe
      C:\Windows\{FAB4A0E9-D1AB-4688-9900-F5684E0A9571}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{FAB4A~1.EXE > nul
        3⤵
          PID:2916
        • C:\Windows\{14D3ECB1-8CA5-4129-8AE3-4E79986354C7}.exe
          C:\Windows\{14D3ECB1-8CA5-4129-8AE3-4E79986354C7}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{14D3E~1.EXE > nul
            4⤵
              PID:1480
            • C:\Windows\{021FF9FF-90FF-455c-B197-7C11232EFE8B}.exe
              C:\Windows\{021FF9FF-90FF-455c-B197-7C11232EFE8B}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3056
              • C:\Windows\{0855B94F-A54F-4851-AF64-9F36D37369E2}.exe
                C:\Windows\{0855B94F-A54F-4851-AF64-9F36D37369E2}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2824
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{0855B~1.EXE > nul
                  6⤵
                    PID:1084
                  • C:\Windows\{64714404-C916-4757-B0BE-A50444B6FA2F}.exe
                    C:\Windows\{64714404-C916-4757-B0BE-A50444B6FA2F}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1636
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{64714~1.EXE > nul
                      7⤵
                        PID:1144
                      • C:\Windows\{80C1FC4E-3FF2-4b96-AC69-52D7DEE01AC3}.exe
                        C:\Windows\{80C1FC4E-3FF2-4b96-AC69-52D7DEE01AC3}.exe
                        7⤵
                        • Executes dropped EXE
                        PID:1908
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{80C1F~1.EXE > nul
                          8⤵
                            PID:604
                          • C:\Windows\{BBE2D551-3266-4ccc-B10F-D180BD8287F4}.exe
                            C:\Windows\{BBE2D551-3266-4ccc-B10F-D180BD8287F4}.exe
                            8⤵
                              PID:588
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{BBE2D~1.EXE > nul
                                9⤵
                                  PID:1588
                                • C:\Windows\{FFF1C18A-DDA0-4fed-A0BE-10D58FBF9FB2}.exe
                                  C:\Windows\{FFF1C18A-DDA0-4fed-A0BE-10D58FBF9FB2}.exe
                                  9⤵
                                    PID:684
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{FFF1C~1.EXE > nul
                                      10⤵
                                        PID:2288
                                      • C:\Windows\{E3D1CDDB-4E68-4365-AB97-A9BE630151CF}.exe
                                        C:\Windows\{E3D1CDDB-4E68-4365-AB97-A9BE630151CF}.exe
                                        10⤵
                                          PID:1508
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E3D1C~1.EXE > nul
                                            11⤵
                                              PID:2260
                                            • C:\Windows\{38104D1D-066C-4e76-AEA2-FB7E57B87B76}.exe
                                              C:\Windows\{38104D1D-066C-4e76-AEA2-FB7E57B87B76}.exe
                                              11⤵
                                                PID:1988
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{021FF~1.EXE > nul
                                    5⤵
                                      PID:2816
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                2⤵
                                • Deletes itself
                                PID:2988

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{021FF9FF-90FF-455c-B197-7C11232EFE8B}.exe

                              Filesize

                              60KB

                              MD5

                              0518ed503bd2f42516c20824a286fcba

                              SHA1

                              f70189b403d3a3bf5e377a8bd7b11f940ffa1f76

                              SHA256

                              5153ae81ec2878adb34901ab5b6616c0c941f1940f04a3294728c322dc704203

                              SHA512

                              f3c020aae9900532df43fa387c4d5530d79cc44ea5639a48ae81ffd5204e435c8e9119c3ff25883a9622196931a74a6ff418b1091a2a4deb4d42ddc504de7c10

                            • C:\Windows\{021FF9FF-90FF-455c-B197-7C11232EFE8B}.exe

                              Filesize

                              26KB

                              MD5

                              57fa41334801d61ca976f0e1e70b1194

                              SHA1

                              7ca4beb37efbb4a5664e5e432950932c507d8b6c

                              SHA256

                              64f8584cff941428ea273cfa1d181ddaf998c2d0da96539fd5ab5c592456880f

                              SHA512

                              6148a61be8e62139cef87adfbda7619d0ef1c2e360424ee8117d2c6c690bb23f7808a7c33d5e30b24458f8a32d0a2280a7e301b87bf17dc91791fd32d7f4814e

                            • C:\Windows\{0855B94F-A54F-4851-AF64-9F36D37369E2}.exe

                              Filesize

                              5KB

                              MD5

                              897f8900e6a2d2ca951117cc3b95f422

                              SHA1

                              409736eda0ee5cd7dfd0c2396c4725a031291055

                              SHA256

                              28b32be9ebce1eb87e5158906c1bf60ab7ed65498368309a798fed8eaea8cf8d

                              SHA512

                              6e56f2d22a6e32a1eeee2a7140ad258aa3499d45f22f2fd45d6be739db5eff66317e1ca8db430fccf0b5c3de27dda635f64ec9442eb89e52a265b572891b2bd5

                            • C:\Windows\{0855B94F-A54F-4851-AF64-9F36D37369E2}.exe

                              Filesize

                              33KB

                              MD5

                              0ef9b97b840bd234da4575abef7ea793

                              SHA1

                              6b9bff28c2fc94d77c9e293ede4d3d268774f173

                              SHA256

                              7cf0466b3777d315732ace96e85d08d130d4dfd1531f6020e4c0df16c0597a52

                              SHA512

                              ac85d1ffe137b32fa6a8471f50c422a3d03cc3abaa654aff5ce426eedd6dca71e75202739f54df75f466b691c8e2cbee14b2d27a0068bd8340c0ab0b314504c7

                            • C:\Windows\{14D3ECB1-8CA5-4129-8AE3-4E79986354C7}.exe

                              Filesize

                              53KB

                              MD5

                              4e49ae3eb44e871018c41ee02aea56b8

                              SHA1

                              ff31e5d0db5d71693be208f1cd716c3de93ad4f5

                              SHA256

                              1b2239e893ec6d55bf5026d83c128125f306e8a053245196b831cd887fc6dd0a

                              SHA512

                              3f0e518ecf927616fa4aa650a9256afa797142bd69db450eeb0de5fd03cdea0b9a0158c5119b01a812ef94d1c9a07dde3074e08ed5c8aa28806266dfb14e8050

                            • C:\Windows\{38104D1D-066C-4e76-AEA2-FB7E57B87B76}.exe

                              Filesize

                              92KB

                              MD5

                              2ac162df97886c6f7214e463e43b5894

                              SHA1

                              9ee446977b501a34b6d5a740ac787e9367ee2bf3

                              SHA256

                              76a999bbf9a27233f4a73f9691da0f79bc5fa13c93bc40b161690bbc78846796

                              SHA512

                              3ed10c9a6c1c43d17ad1ae3944f2d3fee520c92354c0089bf0dc485cf8d4a866b053971cee1008d5860c73d6f26d638a897d076766ca41e68f8824d508e08299

                            • C:\Windows\{64714404-C916-4757-B0BE-A50444B6FA2F}.exe

                              Filesize

                              46KB

                              MD5

                              1aad9b630954940b086bd0b29c7b1a6c

                              SHA1

                              7e6862351f1ae4c401c8890125e7b179ca8a7dd8

                              SHA256

                              10b0f108fc75c79f669d57748df53e9cc3fb0ef29896f51f6d371f8043d0152d

                              SHA512

                              7c54988e925a13241dc84fb76d0d7a56c196e1467f49f9e38b899b26706d102b6959ed63717fdae888d9540440408538ea2889e22be1fa03133c32aebd12f855

                            • C:\Windows\{64714404-C916-4757-B0BE-A50444B6FA2F}.exe

                              Filesize

                              6KB

                              MD5

                              754487e720c90c8abddb0cd9b8a21da9

                              SHA1

                              075799b1c9dbf6d87094746ddca7f8c6ad8119fd

                              SHA256

                              5af2c529db976852917688868db0bd25bd703151fd9013e9f4b8e63e601bad70

                              SHA512

                              8e0c9d4ced3b6385c4c6abb6b7eb381c87fc172755025bd722996a0f7f1f9cf254bbcbb7d69ab2c1bb02966bd7dedddba71129f5a017654ec8de3152375d9b5d

                            • C:\Windows\{80C1FC4E-3FF2-4b96-AC69-52D7DEE01AC3}.exe

                              Filesize

                              35KB

                              MD5

                              3a8a08674498682d9f0971f8fee63ec1

                              SHA1

                              c855ed5b62deea7693d019e55b9f2de83100b189

                              SHA256

                              01c7a5cce2abf7959c52b80f60865e10593e154171743a03fad0c4edf2da62db

                              SHA512

                              f7c822d011894affdbe66212e30981008b9643e761027e6a097c4fcaed06335eceac166a6034b67c34ab720a15a558be350d920e5bd6829eb774d76dc891db15

                            • C:\Windows\{BBE2D551-3266-4ccc-B10F-D180BD8287F4}.exe

                              Filesize

                              4KB

                              MD5

                              03427da460db4e58ed841f6b991b02d4

                              SHA1

                              59923f32fdccdbd4289e107c82ec762fe9fdffc6

                              SHA256

                              b57e2530986de204dce6932fd6254598a0a4e1c8f214bccb8c5f145df1bdd7b0

                              SHA512

                              8b6e6d2c6f54d33679cef606b0212e535b1cf3d2af465df7b7243577a9b24c3c6a7169cef3daea442c5d361d0343f72601333c32c7f36326dc23b2010ba72948

                            • C:\Windows\{BBE2D551-3266-4ccc-B10F-D180BD8287F4}.exe

                              Filesize

                              33KB

                              MD5

                              00c27f8b4d66caa22268c538158ef70e

                              SHA1

                              678a12aa6344834473e6d04fc499d55b68754798

                              SHA256

                              40dc5e474caae5e79e1edf655c8790042dbf60341950bbd1880239333b9b04b9

                              SHA512

                              a6fc338e594f88401261095a7aa84f205df783bd047d0767c867722d0eb50ff8442224e054509e50cfa1fc5cbf59da0dc73e085969f7aec48d99c6f41e9ca4c1

                            • C:\Windows\{E3D1CDDB-4E68-4365-AB97-A9BE630151CF}.exe

                              Filesize

                              20KB

                              MD5

                              222ab291254576be74b803d2548a299d

                              SHA1

                              1a6b2f0fd1977c9d2e347ce03c8276f25da801d1

                              SHA256

                              10f39347bc52ad5ca6dc59d2b4a37614a6c1bd0f6adf7f7a11ed27c2eef193c4

                              SHA512

                              d81bad6fc047643819599fb46a446191573927876a2407df59f6a9552b1357407e3ab6f42852a459975245735d8413a34563778a981506ad02a2b558432e04b0

                            • C:\Windows\{E3D1CDDB-4E68-4365-AB97-A9BE630151CF}.exe

                              Filesize

                              22KB

                              MD5

                              96185fda92f1049acd13796a7c031801

                              SHA1

                              4d51db909b230c102c86b431697fc5552e56dc75

                              SHA256

                              9043b1cfc05a047280b22cd235e4212a779e991ae932817b9d2620b9eb7012e8

                              SHA512

                              ffd3dd94c841d48f21dbd3ebdd558e4d43e3d8de9b880e9b12640b8dbcecb3d3a5fd43c0d62b50ae705af9580e53fb099b1c210cf703d0fd34f6206da2bfe791

                            • C:\Windows\{FAB4A0E9-D1AB-4688-9900-F5684E0A9571}.exe

                              Filesize

                              57KB

                              MD5

                              0bb0ab59015a270eedb7b98c2d707c9a

                              SHA1

                              c958970da926027adb172c2f70e768a47f985d87

                              SHA256

                              6a5b34e94e730cf0db3eece0ed63ec9b0ce073d6e5dc9c58e329839104fee4e8

                              SHA512

                              782689d612b69a4d9606d5853ea25b0d810d22e45cbda4f3b0cc74c8a3bf604c8492100893f0f717b4d392b1564d4075fd191c94a8729e28c7f2ebe61e4f594c

                            • C:\Windows\{FAB4A0E9-D1AB-4688-9900-F5684E0A9571}.exe

                              Filesize

                              46KB

                              MD5

                              93830de45ade6288ad1f0653b23886c4

                              SHA1

                              79969f6fd31cf0110ef4472a926366ccbb243385

                              SHA256

                              a18e80831e250e70c9e354fc546c923847c75700bf4046a3515be2a923edd0ba

                              SHA512

                              4cd4b282e51d049c97e152b2d41d018dddd33be32df09e5a40bbccfa636773f9482999d51abd726442e8dc29352a5373a630d71f40edc29df616063f1997d055

                            • C:\Windows\{FAB4A0E9-D1AB-4688-9900-F5684E0A9571}.exe

                              Filesize

                              1KB

                              MD5

                              e390d5e1c9a5f95b99521de37c76e69b

                              SHA1

                              37cde85109a08b3b0d68aef382e00b09f3768e2d

                              SHA256

                              80ca884b931bb88ac3c9c819bf370704a34239361066e032d31c01fe2e1ee4c6

                              SHA512

                              fad1ef08769adc38455e2b5a614e36854b41144719f164202398888d97d387dac4c98de29088b222fb2756fe416ef6deb4fdf88649aa55ea91de4927542f8e69

                            • C:\Windows\{FFF1C18A-DDA0-4fed-A0BE-10D58FBF9FB2}.exe

                              Filesize

                              54KB

                              MD5

                              588d9c528646f045c72c5946f3b3a76e

                              SHA1

                              e0f7042147b31020785253d2bd46b4aa663d805c

                              SHA256

                              95c50c71f510a8920624938ede50958c751fe61fe38c397339d9e9575a6c41e1

                              SHA512

                              fb50797f928bb0a45d638aa3d1a9a53efbab43353e87ba6f4689cb271e43742487459873feefa4f116c0ae460cda6dfccce17485e649430b60fe6073b81d13c5