Analysis

  • max time kernel
    88s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2024 12:10

General

  • Target

    2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe

  • Size

    192KB

  • MD5

    5d64cea0bb702716f9855520bea944b0

  • SHA1

    f67b195390c2962748cd4d7dbe0853ea20ef640d

  • SHA256

    186f78be381757c893468cec815620a2b16bfcc1840ee853e7ed6256a66769b8

  • SHA512

    ae7328c9534a6b2adb76a176ab6b2ee912a7c0960271f383bf85da2915341bb3294f55c7488995d7fe46880386fb3ec3719832629dde4d5b11ca18012f49b633

  • SSDEEP

    1536:1EGh0otl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0otl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exe
      C:\Windows\{D58F7CF5-456E-4630-B17C-678B762D25E3}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{D58F7~1.EXE > nul
        3⤵
          PID:2724
        • C:\Windows\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe
          C:\Windows\{8730AA78-1F46-45b9-8CE6-6CAF4998A0B7}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{8730A~1.EXE > nul
            4⤵
              PID:2776
            • C:\Windows\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe
              C:\Windows\{41EE3842-4B9C-49a2-9A70-5F058013B5D2}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3052
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{41EE3~1.EXE > nul
                5⤵
                  PID:2960
                • C:\Windows\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe
                  C:\Windows\{FBA566CF-C9B5-4765-A27B-44A17C415D32}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2532
                  • C:\Windows\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe
                    C:\Windows\{B023D9D4-730C-4a6a-AB03-3C40EB76A29C}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1080
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{B023D~1.EXE > nul
                      7⤵
                        PID:2684
                      • C:\Windows\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exe
                        C:\Windows\{A0AEED0E-DA93-4715-9E39-196434C0D488}.exe
                        7⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1256
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A0AEE~1.EXE > nul
                          8⤵
                            PID:2556
                          • C:\Windows\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe
                            C:\Windows\{6721310E-410B-4d6f-8B8C-DD42F86A0F6B}.exe
                            8⤵
                            • Executes dropped EXE
                            PID:2636
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{67213~1.EXE > nul
                              9⤵
                                PID:1220
                              • C:\Windows\{72A57095-2420-4238-8E26-7EC8EE77A2CC}.exe
                                C:\Windows\{72A57095-2420-4238-8E26-7EC8EE77A2CC}.exe
                                9⤵
                                  PID:1632
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{72A57~1.EXE > nul
                                    10⤵
                                      PID:1716
                                    • C:\Windows\{E08F8192-2B73-4ece-A68B-7E56EE98EAB4}.exe
                                      C:\Windows\{E08F8192-2B73-4ece-A68B-7E56EE98EAB4}.exe
                                      10⤵
                                        PID:816
                                        • C:\Windows\{B24593BB-2181-4920-9148-62117A9E2B77}.exe
                                          C:\Windows\{B24593BB-2181-4920-9148-62117A9E2B77}.exe
                                          11⤵
                                            PID:384
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B2459~1.EXE > nul
                                              12⤵
                                                PID:620
                                              • C:\Windows\{360D823E-CE54-4b62-9D30-78C33E6F9DFE}.exe
                                                C:\Windows\{360D823E-CE54-4b62-9D30-78C33E6F9DFE}.exe
                                                12⤵
                                                  PID:588
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{E08F8~1.EXE > nul
                                                11⤵
                                                  PID:488
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{FBA56~1.EXE > nul
                                        6⤵
                                          PID:2720
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                  2⤵
                                  • Deletes itself
                                  PID:1704

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{360D823E-CE54-4b62-9D30-78C33E6F9DFE}.exe

                                Filesize

                                192KB

                                MD5

                                86ceed8b1a720453969a6316ab2beb28

                                SHA1

                                ebe0614e787fde76c3ac3d8460e13acf671d0705

                                SHA256

                                d9087b44989f128203d14f322191c092d84cf628433a22a87692f3f8b6f90e69

                                SHA512

                                b76c49bdfb93c8ff5721dd0bdd30aaad6730a537e30bfc8c8b782c6ca98eff4ec3ff15163b20f7a00bc3468f6f7ac6cc44654479788aa0edc9024443a99e5116

                              • C:\Windows\{B24593BB-2181-4920-9148-62117A9E2B77}.exe

                                Filesize

                                192KB

                                MD5

                                d6c3031303d9a3d84b00e1d1c99a0e45

                                SHA1

                                f5225faa5c8643566dad3ecd99017c04fb4bf686

                                SHA256

                                9e8308ab26d57ac1a961d947d068970de1fab18a972e122fd0a62844227a9e1a

                                SHA512

                                ba632eb29a769e5b5598ea406d7902fbfd198b61cc9d857196379db8e9d84e0a552d0861845ecb5d3430ea2f2b8d05a73223c31e38d1333f2d4de0a7330f0e10