Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 12:06

General

  • Target

    2024-01-06_1f3e224395c2e3e5894781513d05b648_goldeneye.exe

  • Size

    192KB

  • MD5

    1f3e224395c2e3e5894781513d05b648

  • SHA1

    3de5cd65f014e8eafa4dddefd71acfea077cb133

  • SHA256

    78253dfea1888d645790b81c1252d290492addfeb508fa31ed0b9fe5bed1ba46

  • SHA512

    e206afc3c9758837531e0a91a514425ef0f953c8e1cc0a854ffa581b8ffc5e1877a62f2de30726c79719444730a04e9ab606cbaa8d9d2e31affa8fdb94fe6a9f

  • SSDEEP

    1536:1EGh0oQl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oQl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_1f3e224395c2e3e5894781513d05b648_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_1f3e224395c2e3e5894781513d05b648_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:3048
    • C:\Windows\{8FCD9A4A-AAC0-4e54-BA20-111B585CE246}.exe
      C:\Windows\{8FCD9A4A-AAC0-4e54-BA20-111B585CE246}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\{AB65213B-B05D-4164-8302-C20A4AA1F880}.exe
        C:\Windows\{AB65213B-B05D-4164-8302-C20A4AA1F880}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{AB652~1.EXE > nul
          4⤵
            PID:2728
          • C:\Windows\{A4DDA3D2-9E66-4da0-9C43-F58761A25FD7}.exe
            C:\Windows\{A4DDA3D2-9E66-4da0-9C43-F58761A25FD7}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\{6920BA70-F48D-4961-8EBA-8318E6557F29}.exe
              C:\Windows\{6920BA70-F48D-4961-8EBA-8318E6557F29}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\{E602DF90-716E-4208-9827-94CFDB9161F6}.exe
                C:\Windows\{E602DF90-716E-4208-9827-94CFDB9161F6}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1512
                • C:\Windows\{FA8BA22D-B1DE-40a8-87F5-1D55E2B62FBD}.exe
                  C:\Windows\{FA8BA22D-B1DE-40a8-87F5-1D55E2B62FBD}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2632
                  • C:\Windows\{C5EF7FC6-D6E5-4fdf-8A4F-C25C55CA6F5F}.exe
                    C:\Windows\{C5EF7FC6-D6E5-4fdf-8A4F-C25C55CA6F5F}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2524
                    • C:\Windows\{80BBCC8A-BCFD-4405-A358-B821DC261FC3}.exe
                      C:\Windows\{80BBCC8A-BCFD-4405-A358-B821DC261FC3}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1124
                      • C:\Windows\{40A69539-898F-4799-9DA3-C3D86565A711}.exe
                        C:\Windows\{40A69539-898F-4799-9DA3-C3D86565A711}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2236
                        • C:\Windows\{6D8FFEC7-BEDF-47ea-B17F-AB35449CBDEE}.exe
                          C:\Windows\{6D8FFEC7-BEDF-47ea-B17F-AB35449CBDEE}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:324
                          • C:\Windows\{152BF529-E006-4d20-A6FD-8AB89FAAA34E}.exe
                            C:\Windows\{152BF529-E006-4d20-A6FD-8AB89FAAA34E}.exe
                            12⤵
                            • Executes dropped EXE
                            PID:2276
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6D8FF~1.EXE > nul
                            12⤵
                              PID:2028
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{40A69~1.EXE > nul
                            11⤵
                              PID:572
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{80BBC~1.EXE > nul
                            10⤵
                              PID:760
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C5EF7~1.EXE > nul
                            9⤵
                              PID:1128
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FA8BA~1.EXE > nul
                            8⤵
                              PID:2820
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E602D~1.EXE > nul
                            7⤵
                              PID:1872
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6920B~1.EXE > nul
                            6⤵
                              PID:2744
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A4DDA~1.EXE > nul
                            5⤵
                              PID:3068
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8FCD9~1.EXE > nul
                          3⤵
                            PID:2680

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{152BF529-E006-4d20-A6FD-8AB89FAAA34E}.exe

                              Filesize

                              192KB

                              MD5

                              412275465f5ca025f56d7ac3bc9bfd34

                              SHA1

                              1c8c1957795eb122bc6427da4625e1faa0eff8f8

                              SHA256

                              e6c8599ab1cc02b225362c3b5be5271c568d1d49b65fd4d07fff0a9d2f5c3c41

                              SHA512

                              e5b813143433f9133c777af20db5d506ed9a4661bff39512c77a82de673d8074c95658f930dc09620ec85fdbfe5111bb1692975de4c45bfb63a6bb7a0cf11b77

                            • C:\Windows\{40A69539-898F-4799-9DA3-C3D86565A711}.exe

                              Filesize

                              192KB

                              MD5

                              5324d19ea19d492bcb47bb2f09b45b27

                              SHA1

                              15de6253d048b0c9a0dc9d267914b59eb7bc308f

                              SHA256

                              7be9c1d4fbb9245e1d500ea4feb5a901cb5334f108bf155ae947761db1b51ad8

                              SHA512

                              2c9bbc5d3c0c7eb407788fee1de147f7e8f053457aa7c88c78cebae87f3c0b8d3cb873d6deb3f085ec6353943cd8c651a93d87aef4b36e591599428b4e460841

                            • C:\Windows\{6920BA70-F48D-4961-8EBA-8318E6557F29}.exe

                              Filesize

                              192KB

                              MD5

                              485d55f49dc8ab90a8fd0b28340bf565

                              SHA1

                              f12c6dad6cad8665ab995814a0cd62f56115269a

                              SHA256

                              7e0ac8fdc4521498f646a4626301c2a96f07504444746908b173fa7547e8723a

                              SHA512

                              439905fd28c7d8059f40cfdd010cc2baa037d5c44490b8e86cec1592e7573b19c8ee0fa73333a9f2cd82eb619931c88f5057396da16b5a55dc340b6a662a18a7

                            • C:\Windows\{6D8FFEC7-BEDF-47ea-B17F-AB35449CBDEE}.exe

                              Filesize

                              192KB

                              MD5

                              daad8eafa6b0f0a2e61916505bc3665d

                              SHA1

                              1008641a24b8d4083046d4d04badf5071fd7c6d9

                              SHA256

                              f43eee65550195db71576b1e867a848f7955a4ab53268a9c7a1bb1b0dd32620f

                              SHA512

                              ec367f55be12884cfc268db26d576b022f6afc5e98cbd1b5fa50772585a5abd3f0754227076d5757b504d3b5ac488f2810b9d7332b0dd5ccaf69472299db3e28

                            • C:\Windows\{80BBCC8A-BCFD-4405-A358-B821DC261FC3}.exe

                              Filesize

                              192KB

                              MD5

                              ef36a03251245749936b60810cbe6955

                              SHA1

                              d6874e2c866cb3003ebf084d80187bac2d9fd428

                              SHA256

                              b61490f2d9620bf5bb3788f36a6d86075c1e224761fa3a7ab00371b6fe68fffa

                              SHA512

                              57dd82e7cbb01c1397558503f74d3fc8fc24aa278b12fb13d472ab939cc9d11b5a536fe6f7d322c0ab013e7da80342674e103dff1f2e406c7ff46150281173cc

                            • C:\Windows\{8FCD9A4A-AAC0-4e54-BA20-111B585CE246}.exe

                              Filesize

                              192KB

                              MD5

                              b631724ba8b5278d0729ac8911a699e3

                              SHA1

                              3b3ce86b6ee7e546d8657037a93f82c860112755

                              SHA256

                              205fca8b6944e184ff2fe2341eba1849a77994e2c302f09151678f838f17543a

                              SHA512

                              6a2eb02f2e9688002cbef0caba66f74744c8bd8b0ea95c7f5b2ffdeb70851bac467d81950e463be0cae9a18508316737eace07d1bd4f298441a5c227d6a94439

                            • C:\Windows\{A4DDA3D2-9E66-4da0-9C43-F58761A25FD7}.exe

                              Filesize

                              192KB

                              MD5

                              6cabe21150cb2a4282eb2f807d5dff43

                              SHA1

                              33b7a736bf79dd94a53a85de288634035c15c434

                              SHA256

                              c61adbc7d2f966c9689af1e0269adb141f362f34d8c85d2b6983e693abd3bc65

                              SHA512

                              c331923d11b40220a7d8bd57809a2fc3003ef33f8128ce2fabde6bf69eb29fb25fe00e19368fe80fb28291324b614f5d43958a085e1a45dc4682088e57ab89a5

                            • C:\Windows\{AB65213B-B05D-4164-8302-C20A4AA1F880}.exe

                              Filesize

                              192KB

                              MD5

                              a95a1c41e5c079c2b0f5205702efb964

                              SHA1

                              853b00ecefd53b7c06c66fac54274a201a7a2f08

                              SHA256

                              7eceabc954b7597bfaedc57f157997a44633de26cda7293b4a2c48d82e0f55ae

                              SHA512

                              39bf7fdba303511e70503f70d469fdb362576cbd222e462a8d08973a8f5305c691815ceb357edd8c323757f73125f4b71fea3972799caa43f3b1a31a62410172

                            • C:\Windows\{C5EF7FC6-D6E5-4fdf-8A4F-C25C55CA6F5F}.exe

                              Filesize

                              192KB

                              MD5

                              1ed54cee10c7942b2214492970e3f423

                              SHA1

                              fc1ecaa80812c0668ed8510edcf28f34f26a6363

                              SHA256

                              05e5248924fc88afdf89153b8229b7ae27c5b0676ba62e55166890ae1d24ec55

                              SHA512

                              857cefcc398e776767c31575f294a2f41dd10f875637d320375b742462e00ef4e5048f1f73e2bc31ee328c497820400e539fe2c393c96fbaaa06cf398b66970f

                            • C:\Windows\{E602DF90-716E-4208-9827-94CFDB9161F6}.exe

                              Filesize

                              192KB

                              MD5

                              741f9af1e29630a6d5e2999bebae1dc8

                              SHA1

                              61977462c3ec432c80018246165c7a08cb15727a

                              SHA256

                              e6bee488300cc9420fdead859332267ef85423b402a721cd6f0e440cfb8f8c7b

                              SHA512

                              90893db285757c2ef8462d611d45f68c18724fe3a8a1693f1a9ad5952de3f05dbcd27834e6f5d8f18b59669416ec198892f7e48039c0159bc0e69981dc3fd935

                            • C:\Windows\{FA8BA22D-B1DE-40a8-87F5-1D55E2B62FBD}.exe

                              Filesize

                              192KB

                              MD5

                              96f7daf646f262a63dff601fac1e3586

                              SHA1

                              56e9a5f3c029bb05664b7829b9b91afb278c4fa6

                              SHA256

                              0e04d1bd506548a19b3e8ccfe5e92c601a8bd40752c265a2dc9748fa9df0f84c

                              SHA512

                              5dbc367001ead6ffae2c80fb044923626dc5d4bc0246449f732b861f297844b1c47762b7743f596d31cd5197541ea63bf194c2e1a638546a85ec28a293e12b35