Analysis

  • max time kernel
    87s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:16

General

  • Target

    2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe

  • Size

    372KB

  • MD5

    cd3d64a9c892f356b7fc6c399772b069

  • SHA1

    68067bbdd0517a804082004e64320b4578eaa146

  • SHA256

    a69cc275b3780e00d0fd2d99e69c0fa7518649c9347124f7b2131ea8432d34db

  • SHA512

    b273dccb7831258d20bf15c9ed09b82701050846fd2b62e895c42d75d9a5af707895c1078a07dd7f3c95330a870346e57d01f1edafaf35371b719b9a36b72773

  • SSDEEP

    3072:CEGh0oimlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGFl/Oe2MUVg3vTeKcAEciTBqr3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe
      C:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe
        C:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe
          C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe
            C:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2488
            • C:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe
              C:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1504
              • C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe
                C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4176
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{72652~1.EXE > nul
                  8⤵
                    PID:5100
                  • C:\Windows\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe
                    C:\Windows\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe
                    8⤵
                    • Executes dropped EXE
                    PID:4888
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{F30BD~1.EXE > nul
                      9⤵
                        PID:4232
                      • C:\Windows\{FD472DEF-4DF7-4564-936A-CF60E70BD423}.exe
                        C:\Windows\{FD472DEF-4DF7-4564-936A-CF60E70BD423}.exe
                        9⤵
                          PID:4720
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FD472~1.EXE > nul
                            10⤵
                              PID:3896
                            • C:\Windows\{DEFB6F2B-8736-4550-8704-F3E84AAC451F}.exe
                              C:\Windows\{DEFB6F2B-8736-4550-8704-F3E84AAC451F}.exe
                              10⤵
                                PID:624
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{DEFB6~1.EXE > nul
                                  11⤵
                                    PID:3268
                                  • C:\Windows\{CB6C532C-7C93-49e7-816A-BBDAC4B05A1C}.exe
                                    C:\Windows\{CB6C532C-7C93-49e7-816A-BBDAC4B05A1C}.exe
                                    11⤵
                                      PID:1196
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{CB6C5~1.EXE > nul
                                        12⤵
                                          PID:836
                                        • C:\Windows\{D509400F-58FB-443e-9D89-7A385F5ED195}.exe
                                          C:\Windows\{D509400F-58FB-443e-9D89-7A385F5ED195}.exe
                                          12⤵
                                            PID:2092
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{F4B54~1.EXE > nul
                                  7⤵
                                    PID:4232
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{3EBC4~1.EXE > nul
                                  6⤵
                                    PID:2896
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{954A3~1.EXE > nul
                                  5⤵
                                    PID:4176
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B1B31~1.EXE > nul
                                  4⤵
                                    PID:2328
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{F4594~1.EXE > nul
                                  3⤵
                                    PID:3408
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                  2⤵
                                    PID:2096

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  c67011ae098a6b210763b82b42f05e89

                                  SHA1

                                  c328485386bf43110bc88f6666b8e77007a5ede8

                                  SHA256

                                  b2c682c6b2ce9dddd00dfad8a9a26729c3467a976b7198bdfd51e6c0fa05cb04

                                  SHA512

                                  486000cc89b0ca1cde8fe6077e833a0fc4c3775ff5c623a2bdb3915fe0f21c308211fefbea007ab4ac132a3e6bb8b16e092ca1bef2b837eff477def2103d55f6

                                • C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  05e06e3d83a7aad07019cc4c57427f57

                                  SHA1

                                  1c3b904a72db9c909f6f676b86f925afe024a6af

                                  SHA256

                                  e86b1b0ef8379badd3eff60eede26ccfc5f509089cd6f684aae20c63d2d59e23

                                  SHA512

                                  7557846b1e84700590ce3fd85a0cf291d4f8377c756943e6189f14cc73285ec69d01558eb88ce9118cf809c8500a91af421c52a6a961dc1ba75ad471fbdd2798

                                • C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe

                                  Filesize

                                  92KB

                                  MD5

                                  9500da6f56ed539c5ebf73ad3d1fb941

                                  SHA1

                                  63dbb74421bd04f4f905059c8db9a319631cb798

                                  SHA256

                                  57d30193e4707e3f6e4ec067c1171f4345b221d461cee34924fa5993b113db36

                                  SHA512

                                  f10672da4aa71776b35e346404a7accc368ba40897d53ca7abe0749e886eb63d76a1788fd2471a8b7f293b3ac6155bf0b3923efa0d6d718c8868a5a62497e1e9

                                • C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  d2df04c8bedbea074eae6b12dea90918

                                  SHA1

                                  0f21ff74a970748bf02cc9303aa9170abb979a3f

                                  SHA256

                                  11fcb4545adf014c79d671104276c7425c11ced5ad96e0ec8d1a0812971653db

                                  SHA512

                                  ee17b4d587c4081d0c0b5975ece17f1de89ab5c52fcdcf39958846cc8d7da4608b3880d9d7151a23c0c706a92a8ae020f140ef532d8adde0778405ec4e6f3392

                                • C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe

                                  Filesize

                                  47KB

                                  MD5

                                  9d4b73923102bd6e7746924703b5180d

                                  SHA1

                                  484aa42b6193145123d6a5c10d66205075c7f868

                                  SHA256

                                  82859ebfc5462b1f9fd8e46199ee90645bf5a4c0e7c781b0939236b8af3aa3f8

                                  SHA512

                                  bfe346c8d195ccc6b9ce712f878fa4e5fb2365bb08e6087577c17aa019bc185a4e271e54414edf620d4a36ea81604eac9916671a0fd9adfff28f25feadee79c8

                                • C:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  57fe6eea05fce37ddd2e26b6f4c17194

                                  SHA1

                                  4f054f5f6121942592b8394406253108d1661ea0

                                  SHA256

                                  8932e7e5dbf571f9d25c2a929d56557afd61ba3562804b3a890054fba52c01c9

                                  SHA512

                                  19040380960a4b20715f72d3cbea8815a7f0c8102dfbbbe65a61f1b32bcf67c2e437e99a7c0db18105f6d88ef4a3b799cf8c7d7ecdfead52a38be6d129eea79c

                                • C:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  6a00681c1f43600cab7d54cdf0430255

                                  SHA1

                                  b82fede5281368dbba61b9a560b9b278e977102e

                                  SHA256

                                  403377957aea5827ccb327098b40c068ae43ce4b93dc73eb7703448b743d08f6

                                  SHA512

                                  350d4c808bd467003cfb444d028019fcb78b068336bae59306b10ccd184345480b434e1f6a7f69063495c0210c71df10588103a43e2dd4a0ce8fe346a7c47459

                                • C:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe

                                  Filesize

                                  92KB

                                  MD5

                                  39acfcad4ba5c403a845c2f75eb98ede

                                  SHA1

                                  4e8cfb410bbf1bd2eec04bc358d2b7ef8acb3ac4

                                  SHA256

                                  b2aad21c0852ef840783a2b1c1e53792981376d6eea2cf193d821e5e3e268197

                                  SHA512

                                  df22c6e01665ad334e9289356213dca1972511d1550460e4f67251174669aa09813d8e55a13c5e26c9c1d1a9a391515765471382846ce5793b1a61b5d96577fb