Analysis

  • max time kernel
    63s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:10

General

  • Target

    2024-01-06_60eac2616ad8192e3f7451b4b6168802_goldeneye.exe

  • Size

    180KB

  • MD5

    60eac2616ad8192e3f7451b4b6168802

  • SHA1

    e9e57001f7379efc976a4cfde9afa593cbf2ed2d

  • SHA256

    2fbbef8d00ef090bf87a77a5c8337fc7610626bedceda328c4d2b75da25bc22e

  • SHA512

    4fadccc60ec2f2c1c9ea5f2373adb3ba92e4a47ed3b44082b136ddbe65da43770ff2482ee9591e3ab465dbbd4781f2856da5d59f4535d3da44648045b6f438f8

  • SSDEEP

    3072:jEGh0o8lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGal5eKcAEc

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_60eac2616ad8192e3f7451b4b6168802_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_60eac2616ad8192e3f7451b4b6168802_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:4072
      • C:\Windows\{B5E7D6F3-914C-4a05-B182-41E0BEABFB01}.exe
        C:\Windows\{B5E7D6F3-914C-4a05-B182-41E0BEABFB01}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3180
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{B5E7D~1.EXE > nul
          3⤵
            PID:3648
          • C:\Windows\{8055813B-5FCB-4890-A539-E59834BEB629}.exe
            C:\Windows\{8055813B-5FCB-4890-A539-E59834BEB629}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3600
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{80558~1.EXE > nul
              4⤵
                PID:4832
              • C:\Windows\{4E071747-8988-45cb-8CF7-C88DE3DD20AB}.exe
                C:\Windows\{4E071747-8988-45cb-8CF7-C88DE3DD20AB}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4528
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{4E071~1.EXE > nul
                  5⤵
                    PID:3788
                  • C:\Windows\{9EAF366F-5B6D-41d8-A4CB-A6E7F9EB300C}.exe
                    C:\Windows\{9EAF366F-5B6D-41d8-A4CB-A6E7F9EB300C}.exe
                    5⤵
                    • Executes dropped EXE
                    PID:4892
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{9EAF3~1.EXE > nul
                      6⤵
                        PID:2592
                      • C:\Windows\{115C1656-A7FA-44d8-B75A-415F7973EE4A}.exe
                        C:\Windows\{115C1656-A7FA-44d8-B75A-415F7973EE4A}.exe
                        6⤵
                        • Executes dropped EXE
                        PID:3168
                        • C:\Windows\{BF2B5F02-F9B4-4bea-86FE-6EA202E52177}.exe
                          C:\Windows\{BF2B5F02-F9B4-4bea-86FE-6EA202E52177}.exe
                          7⤵
                            PID:4420
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{BF2B5~1.EXE > nul
                              8⤵
                                PID:3352
                              • C:\Windows\{C0F69880-FCB6-45c9-8902-57A0C814CFC1}.exe
                                C:\Windows\{C0F69880-FCB6-45c9-8902-57A0C814CFC1}.exe
                                8⤵
                                  PID:2228
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{C0F69~1.EXE > nul
                                    9⤵
                                      PID:2044
                                    • C:\Windows\{2690455E-AE8D-4a6a-8D5F-BE8014852947}.exe
                                      C:\Windows\{2690455E-AE8D-4a6a-8D5F-BE8014852947}.exe
                                      9⤵
                                        PID:3024
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{26904~1.EXE > nul
                                          10⤵
                                            PID:4384
                                          • C:\Windows\{F85FBA32-13F1-4833-BF72-4C3C9128C5AB}.exe
                                            C:\Windows\{F85FBA32-13F1-4833-BF72-4C3C9128C5AB}.exe
                                            10⤵
                                              PID:3096
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{F85FB~1.EXE > nul
                                                11⤵
                                                • Modifies Installed Components in the registry
                                                • Drops file in Windows directory
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:4892
                                              • C:\Windows\{00100D69-86CF-4827-BB53-B622B3BBA64B}.exe
                                                C:\Windows\{00100D69-86CF-4827-BB53-B622B3BBA64B}.exe
                                                11⤵
                                                  PID:4572
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{00100~1.EXE > nul
                                                    12⤵
                                                      PID:1420
                                                    • C:\Windows\{3AA81BF0-59C6-43b8-AA51-6B2E229C9131}.exe
                                                      C:\Windows\{3AA81BF0-59C6-43b8-AA51-6B2E229C9131}.exe
                                                      12⤵
                                                        PID:2108
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{115C1~1.EXE > nul
                                              7⤵
                                                PID:2920

                                  Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Windows\{115C1656-A7FA-44d8-B75A-415F7973EE4A}.exe

                                          Filesize

                                          180KB

                                          MD5

                                          b844baa9df17e15c5c575d2af3db5f33

                                          SHA1

                                          798f2a6307026e1d309bdba6a98d555080a8a30e

                                          SHA256

                                          eced08696cf7b932f5f2a1b7eb5ba6cf616c7a302cd817b4ecc3a86e17323c5e

                                          SHA512

                                          89bbe54796e52ff1d5d1a9a9bf3b8ca31e8a639b629d67bd83abcaffed115cff388d16feb8ed9ce7232049a8c63d868acc6a608288e00555b3fce3c515421570