Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 12:18

General

  • Target

    2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe

  • Size

    372KB

  • MD5

    ec8d9e7395c1c33e30a0ab8fd3934212

  • SHA1

    8d0e6c39fbf03102a707ed5f4a990f040b1d66e9

  • SHA256

    8d76a5cd7884cd50dbefc34d0d38cc1e60feb17b58aeff409a928948289ab0d0

  • SHA512

    dc7efbdbeb639a96ea7e56ca8fb15335bb1d4d24168f21069ddf53f565a151e1619b81561c10b922229738cf2bb2f378d2bd17d5be34c9026e4aaffe4bb0e045

  • SSDEEP

    3072:CEGh0oPlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGNlkOe2MUVg3vTeKcAEciTBqr3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_ec8d9e7395c1c33e30a0ab8fd3934212_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe
      C:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe
        C:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe
          C:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{A391A~1.EXE > nul
            5⤵
              PID:1132
            • C:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe
              C:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe
                C:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2788
                • C:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe
                  C:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2784
                  • C:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe
                    C:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2780
                    • C:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe
                      C:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1660
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{36564~1.EXE > nul
                        10⤵
                          PID:2304
                        • C:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exe
                          C:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2336
                          • C:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe
                            C:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1636
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D2DDA~1.EXE > nul
                              12⤵
                                PID:1016
                              • C:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe
                                C:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe
                                12⤵
                                • Executes dropped EXE
                                PID:1204
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{A017D~1.EXE > nul
                              11⤵
                                PID:488
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F9A36~1.EXE > nul
                            9⤵
                              PID:1092
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{88644~1.EXE > nul
                            8⤵
                              PID:2816
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{14FD7~1.EXE > nul
                            7⤵
                              PID:1876
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{51574~1.EXE > nul
                            6⤵
                              PID:1260
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7CE53~1.EXE > nul
                          4⤵
                            PID:2720
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5EACF~1.EXE > nul
                          3⤵
                            PID:2652
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1696

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{14FD7442-49DE-457b-9DF9-FB7E2E94EC81}.exe

                        Filesize

                        372KB

                        MD5

                        0a698f571d9073cb2e5843c759ee7b9e

                        SHA1

                        0804f64a9f3a971986a6b4ea88421081c629f4a9

                        SHA256

                        39f7712f8937cc73846a175dc8bd91c3b2f5b346fc1f5c9a088f5535d59f469d

                        SHA512

                        de12180bc24eb776fabe33d4ebe4133bdbbdbde4e6d9cee9d00fc190ee52937c9cd4770d3738edde246144bbc946c1d31a8c95a45b680152eda94dc07db77945

                      • C:\Windows\{3656450D-70F0-4e3a-B2FF-0BE330E80BFA}.exe

                        Filesize

                        372KB

                        MD5

                        35aa1753fa1d874e9016bb2b5c94ac16

                        SHA1

                        196685b248d5249b05ba77587664d8e44d628036

                        SHA256

                        9dad23d97955f818f166b7421eba37335ef3cfc881a80fa6c70ad55d2bb1df75

                        SHA512

                        95733ce7766edad11bab250582e8482d3b5ce6476cc582ef075a637ec389c3f73ebd06d769a3b6b3ea10940a4b9bd9d429894934f592f127a4e2d6f236cc3f5f

                      • C:\Windows\{4EE97DCC-E1F5-4f4f-B56D-9E2613E877D0}.exe

                        Filesize

                        372KB

                        MD5

                        fed61a57f95950114d782e47f654d0f2

                        SHA1

                        2698b6ea8fb67ff380a4d2beed659d0d9591c897

                        SHA256

                        ea6187a1f94ff67d885336825e41aea9aee9b1708d6d7a31b30f24dfe3ae732b

                        SHA512

                        184cb3ef9cd2932f7afc734801e9a4cc0cbf9c5935b539e35e7d8b8db9793545e116ee80ff4c3f9b9d79fbdaa26517d8b4ac93f66d738fb03b362cd4f1d5b86d

                      • C:\Windows\{5157420F-0B37-4ff6-9FC2-0B0389EFBEFA}.exe

                        Filesize

                        372KB

                        MD5

                        cc65c554195b560f218fab7ce15400e5

                        SHA1

                        b020965f266999a7e43ad6cf01c76983147bdf80

                        SHA256

                        571497c7bb06f47e9281867846b00e0844d0be4974f909769e477550865527dc

                        SHA512

                        46454dce2b40e6153992949d05b983b53b4921b6579338c1c6523e2cfa1aaf361550695934b9aff0c7657b3ba33a13fccd935a7145ec6e9a97628d2172e1ec88

                      • C:\Windows\{5EACFB39-E341-48b3-9A4D-9E450D3D601F}.exe

                        Filesize

                        372KB

                        MD5

                        7a3f7d513665d5d21f3c3d79fc9815a2

                        SHA1

                        d4332aef8f643945561fa869b0d01b648c956e2c

                        SHA256

                        083be23d493bb4a1105e63d523143aa8c3c159cb4c654ea7874b7ecea415b718

                        SHA512

                        8d1f60cbdafe0bd5ae2f5d7b8791556f9b8d0911bebdd0c243be33cd7614b7d22f415c33c516ba7f5b83efe574b7d051a50718c612ad70bb3a01772276dcdddc

                      • C:\Windows\{7CE53478-F830-4ad3-93BD-779C6D75C5B8}.exe

                        Filesize

                        372KB

                        MD5

                        c0744e1538e2910e3f5a06da779e51f9

                        SHA1

                        1cc28c0603d74931385d77683956cbd612c8c551

                        SHA256

                        515447d768dcba3da8fc01a641e660d527dac6df2dc78e67064fa981e3580173

                        SHA512

                        a9ba995e5b2ec3ae5a9d42d869e89253b06f961a2253cbf734b8912772cdad43663800f600a2dc47fc27ff54f33af251d25381edfa374a65f4e4ec90dba5ba80

                      • C:\Windows\{88644A01-76C6-4a85-AB0F-2C1250475C7C}.exe

                        Filesize

                        372KB

                        MD5

                        b7670eb36ae55975d3001cb9fa917efc

                        SHA1

                        32bdcdf327825de3d22eac910bc25bfbe269e212

                        SHA256

                        4b459f4b84d15effcdcc95a37f322734114102eb5f337d53be23f8b6cc98b425

                        SHA512

                        f62594d5ce176c9d74bfdc7c03ccf8f5fb89c599f1ac1c7cc0f730496f5574fafec5c295084276f089cf255dfb7a0c87c5753cde9337398114fe99d2883baf1d

                      • C:\Windows\{A017DFDE-A061-4f48-A592-C62582F07823}.exe

                        Filesize

                        372KB

                        MD5

                        ee546d28ef5bceb68cb238c5adf19959

                        SHA1

                        f375fc3972ffaf51d40f9ba355b6bd468902b352

                        SHA256

                        8d5023b5a2b8586cd7c37c10f6a5ced386143b369e5ba73b507271e3afd617bc

                        SHA512

                        3f0138e51ead1c1eb760faa19a8828ca6c8f19fff022395724e0aaaafacc674702a5c370420fc62d77d5b29a4ee6763befb71b1e2bdc2422ecc76494e128e1ad

                      • C:\Windows\{A391A3D3-7462-41ac-8B53-325ACC812042}.exe

                        Filesize

                        372KB

                        MD5

                        6d5994397cdcdc45a7febc586a75c732

                        SHA1

                        78e8de3b0e989c366dee4f2bfe2f127aed47d9b5

                        SHA256

                        52802c26914066e87ee0aa087305d27f4f32f3b722709de4f8ad3e94fca6acca

                        SHA512

                        5a1341f5eb35308d96b5922c8c6fd05f486b9bdf2ecd6fff4ed50ae338fecdf29b58ad81196dcf246cca82e52a74650d04c0ca8ffeb559aa1287ba6258e3aa05

                      • C:\Windows\{D2DDA08F-3FF8-47e0-9DAF-7B213C9DB5E7}.exe

                        Filesize

                        372KB

                        MD5

                        ed788f3ff58bbef71d8403c68f254695

                        SHA1

                        86d7bdacb78553567f25f7131a8527e6180d5b78

                        SHA256

                        d67053a27fb143c302b3a3430a56b7667857e2e36d6a9bd2b82b67003aacb939

                        SHA512

                        00224eb3965baa8d794c1c3ab3a733e5832f9683c8122220461a6d2f27448ede5bef8cd4650f9a0b21a8a325220de91a8a0a3d2984e890862baa6c8926eea135

                      • C:\Windows\{F9A360CB-4FE6-48da-8E86-813B69634208}.exe

                        Filesize

                        137KB

                        MD5

                        da4862b1b2e36d60c623af4cfb441717

                        SHA1

                        5fd7ec61c4fd45a12fb2625f39231322c59f005a

                        SHA256

                        e9a0511268dc1b7cb9179e20b21546c3f4c2719aeb60125134e71cc06a90fb1b

                        SHA512

                        30835b63872bdd4bf8b4b6e7c69b6ebb82f349c073badbd265256bfe6329bd9b02710647b6f3968f8e24f8842b91d9ec0c18a3c708a2c8dd164f4b67b0e50c72