Analysis

  • max time kernel
    168s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:09

General

  • Target

    2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe

  • Size

    216KB

  • MD5

    4b28fb3cdcf9813756a9fe13659a710b

  • SHA1

    e3768d1fe2491b376f79c3e1518999fc524a8b9e

  • SHA256

    c70e39a8d1d215a851fe3746b0bc5137c1e26f243ffbbb32113c69a450d6d6d1

  • SHA512

    5aeb51ac0eb809614657246fc3e7c7245415b6eeebc8653219371aeb8ed171856c2aca1f04711aa12c6449c336c086f0fa2c922bb765e0fe19be700a26e3e20a

  • SSDEEP

    3072:jEGh0oYl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGalEeKcAEcGy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 18 IoCs
  • Executes dropped EXE 8 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_4b28fb3cdcf9813756a9fe13659a710b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe
      C:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe
        C:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{64CC9~1.EXE > nul
          4⤵
            PID:3360
          • C:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe
            C:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe
              C:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1788
              • C:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exe
                C:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1716
                • C:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe
                  C:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3348
                  • C:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe
                    C:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3684
                    • C:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe
                      C:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      PID:376
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{75E9A~1.EXE > nul
                      9⤵
                        PID:3648
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{C0069~1.EXE > nul
                      8⤵
                        PID:4784
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{947CE~1.EXE > nul
                      7⤵
                        PID:3408
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{A2B24~1.EXE > nul
                      6⤵
                        PID:3796
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{66BEC~1.EXE > nul
                      5⤵
                        PID:1976
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{BC300~1.EXE > nul
                    3⤵
                      PID:4476
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                    2⤵
                      PID:4584

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\{64CC959B-2C60-407b-B3A5-E276003746A0}.exe

                    Filesize

                    216KB

                    MD5

                    9097253b8423448299beb8651233d885

                    SHA1

                    4eb63d11513c9408f624c38cc445fc11d8e52bfa

                    SHA256

                    80ed34325f44a7172c0cb6f56a576c2be2a5e8cbae04fd25041bc34590c1d352

                    SHA512

                    6405fc159bbc1598c95ce5af66dabed6a73688360e7d4edad440da091848a0a805e5d1a601d82207953e9fac02ed7e931ee105bbcc9cc8a85c2937f4641469ce

                  • C:\Windows\{66BEC0FD-4A92-4ec7-9BCE-ACE8AD37A652}.exe

                    Filesize

                    216KB

                    MD5

                    fb7abe0a5a0fbb4ceb6ffab2432df4a0

                    SHA1

                    6752940c4cabe51304bec50e480c173129a97165

                    SHA256

                    1ed3aba46ffd655ab5450cb05c0ca5537482c2dd53d5a104338174beaf806c2a

                    SHA512

                    bbbc0af549c4b29d59489eea89ed914c6b7643e2e142a8fc1e50cd0d248ec848443e69c24a69c988d95c1227a520827f3891519486d5876e5f6f814cfe7b08dd

                  • C:\Windows\{75E9A09F-800B-47b7-BC73-991D7957B1A6}.exe

                    Filesize

                    216KB

                    MD5

                    f347357d27672839973567120e741f8a

                    SHA1

                    1578c063f68fd14a052695a373aa6aa7270b62e8

                    SHA256

                    fe21302db29c2c0bc6f8828dd68cf8ae392976c22fb229fbc387aca481c5c28b

                    SHA512

                    6385986b85f88b48dd4de34d8bb58717805e99405de22ecf0950194c4e5e4dd70f624fba4ea6b6040262a53ffe4e8b67534069820444ae7725133f998eb141b1

                  • C:\Windows\{947CE26D-A281-4a21-86BA-73B200D20293}.exe

                    Filesize

                    216KB

                    MD5

                    f0d0510b0a5c173dae060898342e4da4

                    SHA1

                    a63d27c1c4624a2f1a647c45b8400a5ab3d46067

                    SHA256

                    9dedf6835970fef2243bf0bf9dd8a480dbe114abe1d1314ab684504768877024

                    SHA512

                    98d3031e9f63f981ec42f43d14aa897ee679799092ec064ebba6257155271f3c223f35a3969cc59c6af2334bfeb93b99f37b24c9d87934f76271b74a84ef2931

                  • C:\Windows\{A0352F02-3831-4928-8FFB-A4584A37A702}.exe

                    Filesize

                    216KB

                    MD5

                    708c7b4956e0e45fd0aaaa40e27ac31c

                    SHA1

                    998084f98903298753a6ba52f4bd5a27c9cadbc3

                    SHA256

                    7027ab635bed8c45b6852e345aaaa0efd4cd3261b97cd3da5bcf91fcbd01955c

                    SHA512

                    f0ace378056c4be8605f5d5b4a93b53ab2b9837e0c7af72d88f9a478b7bac3617e77e55228a0c6e5f548b313d2367d1afbac6eb572168dbc08a88b7663d44da7

                  • C:\Windows\{A2B248FF-9212-4b76-9D15-B245E737384D}.exe

                    Filesize

                    216KB

                    MD5

                    7456f649e98c26a9763921e4ff1bc58d

                    SHA1

                    8d0c5b2aecff8b60dcd91d871f07267f788b5fac

                    SHA256

                    99587abd57cf5ac5bc101a324203caf5e9809d345046f53659374e220b6e10b7

                    SHA512

                    e7ca61206914959fc5f5e4a31b8dcd8bc1ba0d56ef6a137ab128b1e503a083489dbff0ad13b2887f3e468773686945d7223e6414df3f5a979ef15fe59a03aa23

                  • C:\Windows\{BC300F9B-94B6-42bc-95F4-57548A46D161}.exe

                    Filesize

                    216KB

                    MD5

                    38546caf4454ab441165b2b06e384c56

                    SHA1

                    666057437ad167dc08af16f49676547fdf1c3c6b

                    SHA256

                    9ce57e5feb9a188054cb6ce73b55d68d73b6a4be587147289ccd7dbf0ac7c46c

                    SHA512

                    2d77ce0d74545a8630ace329256feee4ebfee9b8b504e9ceb71066fcda1fdbef1321497d15eeb5953f74a04237e1d444a55f47bf51b29b368891bdd081b56a3e

                  • C:\Windows\{C00692F1-C1DF-487f-80FD-A2A2EAD10192}.exe

                    Filesize

                    216KB

                    MD5

                    d95586aa4272267b109b56010a66ffed

                    SHA1

                    44d26567e38cdf8158fa222cc07c9f64a980e3a8

                    SHA256

                    776931dae081728473ebfefeeff279c84ba0a6c87183eedcc6e338660c0e7868

                    SHA512

                    e603965375a2225202f69712a77b0dd62795307a6366a3262219eb4580d26f15db9edaf984520a5bef6f5a78e83a61cc781bdaa67f588e3befec71c9c04abb4e