Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 12:19

General

  • Target

    2024-01-06_fe7a49f5929d36ef4f87c148f0f6daca_goldeneye.exe

  • Size

    344KB

  • MD5

    fe7a49f5929d36ef4f87c148f0f6daca

  • SHA1

    cf4ad50f765af6e3993d2785b3befac36239883c

  • SHA256

    7c6de846eef4c8c1bb9d5ab70d211c8c33dd11f16c065eac07b71dc4b8486375

  • SHA512

    7b18ac35c17fdd45708477e290382d01556cb83f51d7607fe8df92f56c0c81441f5312c0b0b4c0077ccf0ca40c2b4f2264c24bca78293bfc60824d6c10ba6739

  • SSDEEP

    3072:mEGh0oLlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGtlqOe2MUVg3v2IneKcAEcA

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_fe7a49f5929d36ef4f87c148f0f6daca_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_fe7a49f5929d36ef4f87c148f0f6daca_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\{B452D6CD-B982-4cfd-833A-1C331C6D60E5}.exe
      C:\Windows\{B452D6CD-B982-4cfd-833A-1C331C6D60E5}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\{38BF387A-B9CF-4be6-9943-732146991BD6}.exe
        C:\Windows\{38BF387A-B9CF-4be6-9943-732146991BD6}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Windows\{BFD9B581-24D2-40f1-B245-AC264A5DC635}.exe
          C:\Windows\{BFD9B581-24D2-40f1-B245-AC264A5DC635}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Windows\{81E691BB-32A1-4d3d-9AFE-26AF656780F7}.exe
            C:\Windows\{81E691BB-32A1-4d3d-9AFE-26AF656780F7}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1728
            • C:\Windows\{18A7F640-7E7A-4dc6-9880-070183CBF104}.exe
              C:\Windows\{18A7F640-7E7A-4dc6-9880-070183CBF104}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1084
              • C:\Windows\{B5CED859-2BE4-49e9-A2B7-92CA245F2915}.exe
                C:\Windows\{B5CED859-2BE4-49e9-A2B7-92CA245F2915}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:548
                • C:\Windows\{F12F2353-4FB0-42f0-8A34-9BA301E11512}.exe
                  C:\Windows\{F12F2353-4FB0-42f0-8A34-9BA301E11512}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2000
                  • C:\Windows\{6EA12D6B-F232-46ef-9618-9326C3E326AF}.exe
                    C:\Windows\{6EA12D6B-F232-46ef-9618-9326C3E326AF}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1772
                    • C:\Windows\{74668DF1-4DC6-4cb5-A38F-5C63E525ABB0}.exe
                      C:\Windows\{74668DF1-4DC6-4cb5-A38F-5C63E525ABB0}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1520
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{74668~1.EXE > nul
                        11⤵
                          PID:2944
                        • C:\Windows\{9E2B4EF2-F7E6-407f-B292-0A6F0D32F48E}.exe
                          C:\Windows\{9E2B4EF2-F7E6-407f-B292-0A6F0D32F48E}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2296
                          • C:\Windows\{26F67E04-95D0-4ee4-BB24-B45987BD6A06}.exe
                            C:\Windows\{26F67E04-95D0-4ee4-BB24-B45987BD6A06}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1916
                            • C:\Windows\{27A3D240-7DF2-4d59-AC2B-E2C566A4E69F}.exe
                              C:\Windows\{27A3D240-7DF2-4d59-AC2B-E2C566A4E69F}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:436
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{26F67~1.EXE > nul
                              13⤵
                                PID:660
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{9E2B4~1.EXE > nul
                              12⤵
                                PID:1652
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6EA12~1.EXE > nul
                            10⤵
                              PID:2792
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F12F2~1.EXE > nul
                            9⤵
                              PID:2504
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B5CED~1.EXE > nul
                            8⤵
                              PID:1704
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{18A7F~1.EXE > nul
                            7⤵
                              PID:1680
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{81E69~1.EXE > nul
                            6⤵
                              PID:1968
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BFD9B~1.EXE > nul
                            5⤵
                              PID:2616
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{38BF3~1.EXE > nul
                            4⤵
                              PID:2664
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B452D~1.EXE > nul
                            3⤵
                              PID:2800
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                            • Deletes itself
                            PID:1696

                        Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{18A7F640-7E7A-4dc6-9880-070183CBF104}.exe

                                Filesize

                                344KB

                                MD5

                                f752859aa1befd774cc563c4edd8cac4

                                SHA1

                                dafe1d94232b0d97d29dcf65d6bf4526e397e561

                                SHA256

                                e9127e47eb0792eb68a659bf78df91be38450bbb2bdf33dfd361ec63d87e38a6

                                SHA512

                                bf47f22b3349d33d49e586cb4e6690e81f6b88f7d01c9000dfa87e5624a0937001f8b26826e8e116c6b3cad961b76fb9ca6ca6ea2f6ad7caa3d187d5103e0984

                              • C:\Windows\{26F67E04-95D0-4ee4-BB24-B45987BD6A06}.exe

                                Filesize

                                344KB

                                MD5

                                c9801b5d3635bd52ca8b29354f69d7e6

                                SHA1

                                5766e44298e85615e120da5998a3974d0c555f74

                                SHA256

                                1d102f8bbb9138bfc1496e03d3493ccfce0d63dcfbacb21097ca1171f63bcff2

                                SHA512

                                66fdf4d227c7f6989d5ae2e1dccd7c9e5b11e111c081b1ba80a644c6db720e91e7c20eddb2520cfea355baa839f7d991804143904ef5f2e0d7810b2c49252aab

                              • C:\Windows\{27A3D240-7DF2-4d59-AC2B-E2C566A4E69F}.exe

                                Filesize

                                344KB

                                MD5

                                e1bdbf076b5e487f1f22807810d7e705

                                SHA1

                                cb6e8c16884c1edc486e7ee3db4ef9e0a2d954a3

                                SHA256

                                7fe1f5dbcd59b2fc1bd5abf2a2022e085ae1a3587318084752c258b32aad6c10

                                SHA512

                                f324669fab84e4b237a58578e9f853265071c91de15daf8c481badea6e930bb2fbe73b1c3a093af56e192a86b41f1ff25bcde5d45738878dbd0cc33a28b6ba8c

                              • C:\Windows\{38BF387A-B9CF-4be6-9943-732146991BD6}.exe

                                Filesize

                                344KB

                                MD5

                                91c927ba61cecec794930dc4c8214bdd

                                SHA1

                                f3b816c478f560a5365f713211aa326d37f373ae

                                SHA256

                                909dcea46b09fb7b7de3fed0fab78a84d3b8ca108f32633982a53d55adcd3bb4

                                SHA512

                                bc3213d213b64e48ff7a02ee5da12536a483adb3ecc691f8ed584a8102431807b7be08497dd286f07fe3aa58d2f2e813480ab3595d4290c7312533e77e66c081

                              • C:\Windows\{6EA12D6B-F232-46ef-9618-9326C3E326AF}.exe

                                Filesize

                                344KB

                                MD5

                                20dd2f1ca8e3e732fbc85f182764cf42

                                SHA1

                                bb898e3adc3342847f107ea554bacf0db9658a93

                                SHA256

                                fcdcd1113a72cb4b6f477d024bbc81a050ff2d3cc54cfea74669fe28b0927713

                                SHA512

                                dd6ca52b91c2b1f3f43274036d59f1cd98f86294a7ddc8a08b5fedba0b30ad9a66b47f906c554c777c52fa957fa239877da8bdf87d57fd955bc14a3fa4932163

                              • C:\Windows\{74668DF1-4DC6-4cb5-A38F-5C63E525ABB0}.exe

                                Filesize

                                344KB

                                MD5

                                ec76d34cd17453cbc9c6fb7e313ebd02

                                SHA1

                                77ad7fa7e7d11ba7999f152f052de3dd0c8a92d8

                                SHA256

                                eef036c1114539c994285c7ffba9fb2adc3a1e7f1e9cbeeae3fb358f359b0d28

                                SHA512

                                2fcff691b0ae9b2d5fd1563a265968ef5cb418b1eb809a6cc789634c4ebe5b7ecc7a2e6829d60cd2c0399d867c34e9533fef8e8f3563694ea215f1e2bb6afecb

                              • C:\Windows\{81E691BB-32A1-4d3d-9AFE-26AF656780F7}.exe

                                Filesize

                                344KB

                                MD5

                                ff71c824c9112856903e6ebc79905133

                                SHA1

                                1974a6e839e3147b9deb10ba9de745768eb88e3f

                                SHA256

                                54fdba436da6ad92af9aaaa5de1bfab1189a1bcbdd54273c41827b05a8c93745

                                SHA512

                                0172e31f83b6d97a29ddd69a85c759db00611d1ee2c1527139c98816891ccc8f28cc5e11d5b02d80b47c87a8f6786841166362f9e46c81ad57feb2f4788ab1ee

                              • C:\Windows\{9E2B4EF2-F7E6-407f-B292-0A6F0D32F48E}.exe

                                Filesize

                                344KB

                                MD5

                                6d28beb980c2365cb21a3add4638a52d

                                SHA1

                                428b3c0394b1b2c7f4f265e7f89b6148e2252aa4

                                SHA256

                                f6281275a02f2fad8c8a463c6956388b64216daec2d7104b7e5dac6cd18de9c7

                                SHA512

                                6031bd0f0f0d73e3a8f54d86fcecf65b7fb9ee3ed37bbad55060399c4c267462e7fc23747398fc3c58df30445305e42c8d99f5e11dbfd34a83d5322c2c21da16

                              • C:\Windows\{B452D6CD-B982-4cfd-833A-1C331C6D60E5}.exe

                                Filesize

                                344KB

                                MD5

                                df6a23beeba11c8ba8a40925ee956520

                                SHA1

                                ec6af230c4f3def91112128cda72d7a25c89b842

                                SHA256

                                95232100f353bb2e5d5cf04bfb68a4b51af2a58d7a6317c7aed7c6844d6f7261

                                SHA512

                                544934479cbc3af1e53b9706b34a1ebdd23a52a0c69a8d335bc89a6355d7e82dc9a40deeb657b68f706fdbfdd69a7ed54aa067f1b2249c717bfe2ff270a9bd20

                              • C:\Windows\{B5CED859-2BE4-49e9-A2B7-92CA245F2915}.exe

                                Filesize

                                344KB

                                MD5

                                08c139b8cb845aff829012e0936f4b4f

                                SHA1

                                32bbc012fd1210152d93858d3851057af793a7f8

                                SHA256

                                4160c3778c754a695fa00a706bc8b4163032d437a6649c0a456b32bc64cb2306

                                SHA512

                                f74306509c35c88f0aba98953b8b90aadf6f137a73feb8ddd72e773659e481f457a38b255ca9443eebccb2656434d1a5a930d5d3923f7ac9953ae526e8a3e4d6

                              • C:\Windows\{BFD9B581-24D2-40f1-B245-AC264A5DC635}.exe

                                Filesize

                                344KB

                                MD5

                                0c05ff903f39c72578d6caaf820c566b

                                SHA1

                                6206de016a623530235b890e12a250e3fba70981

                                SHA256

                                d1d345b778a8f84e2f3b96f1c58f3e37d26da05d1c25ae0bccaa3ccd6ec8932b

                                SHA512

                                ff2d7f95c5e50ca7d267dee12c8aaf7d9d2987fe540a9c454cd8b0d7d21934b89b74bf1956cc2bc581885767859881cd90bca0ac8f713e61c0e6708245ebd086

                              • C:\Windows\{F12F2353-4FB0-42f0-8A34-9BA301E11512}.exe

                                Filesize

                                344KB

                                MD5

                                c0bc8e87c5e5a4932902f2989cd0d6ab

                                SHA1

                                f98d267943b5900db389a8640c5a4b1a368d7128

                                SHA256

                                c23dd0395989f76e812622b25a8946854eb7d3fd300c13562c5556053cbf33e3

                                SHA512

                                236980633b31cacfe1ee1237a6052b2cb9722a73fe7088ad0be0ef35f28ea283474f6357d545463ff1226bf7f6fb720fc0341cd7c314bea2a7856bdf0387d30f