Analysis

  • max time kernel
    88s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 05:41

General

  • Target

    2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe

  • Size

    168KB

  • MD5

    3f536e06b9fcab649debde9835e259b5

  • SHA1

    df768349bf602d5727ba029d92395b75e646cd6a

  • SHA256

    491358089b38175d7ad09cdb120f04e5598bc3fbd5d7836e8735cf8aee002b17

  • SHA512

    52decdd5f76b6a646a206c3a0d6a264c6084b2646f8da92c0fb0a091c15b4af6be2f4771479eec90e52b5a595b7b70a2db22ace836293749b7045aac9c96c78e

  • SSDEEP

    1536:1EGh0oElq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oElqOPOe2MUVg3Ve+rX

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_3f536e06b9fcab649debde9835e259b5_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2644
    • C:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe
      C:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{86F42~1.EXE > nul
        3⤵
          PID:2656
        • C:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe
          C:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{1449C~1.EXE > nul
            4⤵
              PID:1096
            • C:\Windows\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe
              C:\Windows\{6B8405E4-A07E-4fd2-9967-E7EE628400A6}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2684
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{6B840~1.EXE > nul
                5⤵
                  PID:1084
                • C:\Windows\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exe
                  C:\Windows\{B6A6B91E-F190-4779-9F30-08062A205B1A}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2516
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{B6A6B~1.EXE > nul
                    6⤵
                      PID:2768
                    • C:\Windows\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe
                      C:\Windows\{3E51A998-E79C-4cdb-B049-CA6F40C2953A}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1356
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{3E51A~1.EXE > nul
                        7⤵
                          PID:2804
                        • C:\Windows\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe
                          C:\Windows\{8EE0B27C-44E0-40ad-A0C8-F65B4E8EE9CF}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1340
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8EE0B~1.EXE > nul
                            8⤵
                              PID:2836
                            • C:\Windows\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe
                              C:\Windows\{6CDD65AE-2493-4ea6-AA25-FA6AAA5D89C5}.exe
                              8⤵
                              • Executes dropped EXE
                              PID:2560
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{6CDD6~1.EXE > nul
                                9⤵
                                  PID:320
                                • C:\Windows\{05B8D2A4-EE53-48fa-9C2D-378D0D49484A}.exe
                                  C:\Windows\{05B8D2A4-EE53-48fa-9C2D-378D0D49484A}.exe
                                  9⤵
                                    PID:1680
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{05B8D~1.EXE > nul
                                      10⤵
                                        PID:1072
                                      • C:\Windows\{C5B843DF-FCFD-4f5c-AF36-FD0F91B8EADF}.exe
                                        C:\Windows\{C5B843DF-FCFD-4f5c-AF36-FD0F91B8EADF}.exe
                                        10⤵
                                          PID:2968
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C5B84~1.EXE > nul
                                            11⤵
                                              PID:268
                                            • C:\Windows\{87E07610-0983-40ca-99CF-2DAE1141EA90}.exe
                                              C:\Windows\{87E07610-0983-40ca-99CF-2DAE1141EA90}.exe
                                              11⤵
                                                PID:2300
                                                • C:\Windows\{DAEAF93D-6240-4bac-8EF9-0B72B16BA44D}.exe
                                                  C:\Windows\{DAEAF93D-6240-4bac-8EF9-0B72B16BA44D}.exe
                                                  12⤵
                                                    PID:948
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{87E07~1.EXE > nul
                                                    12⤵
                                                      PID:3004

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{1449CEFC-45C0-4674-AB48-55DE1AAC2904}.exe

                                Filesize

                                168KB

                                MD5

                                38fe9f657abb5f66a37713900078ef41

                                SHA1

                                ed6ecc015723c9a5a913ff4c260a6c81b4a88344

                                SHA256

                                c896eb5d7c186b2338f242e3056f0a848bb8b70fd94fccdc9a8ccdf23d6150e6

                                SHA512

                                8e843643aa9f30e122c8fae6c45720f03aec4f82a2a1894f3082055579c9a45801d7a716a83328f63a9c40208a93f78b4372daf4e4f3d97191da516e39e36da5

                              • C:\Windows\{86F42BC7-17ED-4898-A6A1-80D27D3C9AFD}.exe

                                Filesize

                                168KB

                                MD5

                                4c771c30bcf3f209d0c4f7e35a7a06f2

                                SHA1

                                db2f6b9928eb34260e0b85b8cecb82d389fa2a62

                                SHA256

                                97c7c6a3b234c17222f437acf6e6fe4255ec542dd2034d15df64f4b89968ecd7

                                SHA512

                                b562a61823ade5f4660d8a92cc8bf279b1deba43744e9131f38a90c5b6e20bd4f3a87bac06b89d22ae05d78b2414cfee5e4562f4909e4ee1da25e1c722476e32