Analysis

  • max time kernel
    63s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:42

General

  • Target

    2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe

  • Size

    408KB

  • MD5

    74cffa8e517ec3c7672c00fef2b24451

  • SHA1

    07d735726514e8efbcf637f054483113bb53010a

  • SHA256

    7f54746215b76151e25a466b5393b969fa68df6e72b144da557d99dc2b76bb6c

  • SHA512

    19538f0e05d024c9435fc8030e9bb0c1b9e0104efc2ecd0900cb164fb58a5a0ae3fd4b9d0489d82856263bd7a6cefddf113988728bd1898ff5cab651260f0df4

  • SSDEEP

    3072:CEGh0ofl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGdldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_74cffa8e517ec3c7672c00fef2b24451_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:1132
      • C:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe
        C:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{CE3F4~1.EXE > nul
          3⤵
            PID:3020
          • C:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exe
            C:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3180
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{706C1~1.EXE > nul
              4⤵
                PID:3116
              • C:\Windows\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe
                C:\Windows\{C5C192D0-1E79-4bf7-A9E2-30F2AAF77110}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2436
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{C5C19~1.EXE > nul
                  5⤵
                    PID:1416
                  • C:\Windows\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe
                    C:\Windows\{3E0963C3-5EC0-49dd-AC8D-2EF3E97A1090}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2016
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{3E096~1.EXE > nul
                      6⤵
                        PID:1036
                      • C:\Windows\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe
                        C:\Windows\{8B3E5242-1A3A-405e-AC1A-589D27C8CB6C}.exe
                        6⤵
                        • Executes dropped EXE
                        PID:5040
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8B3E5~1.EXE > nul
                          7⤵
                            PID:2192
                          • C:\Windows\{3917639C-0CA6-47bc-B31C-D1EAF0A8603E}.exe
                            C:\Windows\{3917639C-0CA6-47bc-B31C-D1EAF0A8603E}.exe
                            7⤵
                              PID:1048
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{39176~1.EXE > nul
                                8⤵
                                  PID:4156
                                • C:\Windows\{63631619-B103-45f3-BF95-BD2549696656}.exe
                                  C:\Windows\{63631619-B103-45f3-BF95-BD2549696656}.exe
                                  8⤵
                                    PID:4708
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{63631~1.EXE > nul
                                      9⤵
                                        PID:4908
                                      • C:\Windows\{8DCC02C7-04CB-4463-992D-E2A9B5122D66}.exe
                                        C:\Windows\{8DCC02C7-04CB-4463-992D-E2A9B5122D66}.exe
                                        9⤵
                                          PID:1524
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8DCC0~1.EXE > nul
                                            10⤵
                                              PID:1512
                                            • C:\Windows\{0741249F-EDBE-4e39-A63C-3023CD14BD77}.exe
                                              C:\Windows\{0741249F-EDBE-4e39-A63C-3023CD14BD77}.exe
                                              10⤵
                                                PID:5080
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{07412~1.EXE > nul
                                                  11⤵
                                                    PID:3844
                                                  • C:\Windows\{DBDF7005-B347-4de8-BA8A-204724D14FEF}.exe
                                                    C:\Windows\{DBDF7005-B347-4de8-BA8A-204724D14FEF}.exe
                                                    11⤵
                                                      PID:4588
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{DBDF7~1.EXE > nul
                                                        12⤵
                                                          PID:720
                                                        • C:\Windows\{C99EB621-FBCD-4332-8CDB-6889EF325B44}.exe
                                                          C:\Windows\{C99EB621-FBCD-4332-8CDB-6889EF325B44}.exe
                                                          12⤵
                                                            PID:3680

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\{706C198F-F8C9-4010-A908-24D108C865B1}.exe

                                      Filesize

                                      92KB

                                      MD5

                                      acfd8005dc3b3a4dac6523b86c1ede2b

                                      SHA1

                                      d57616dee638fbe87926f3bdfbb432d4364c03f4

                                      SHA256

                                      3ec4b4e8f3b1ce0598e5af89cb035b495f3a837e55a8f2c9d31509b06ae8e29f

                                      SHA512

                                      aca51b5712fe4e4cda91d67c911e441adac350f24397e5191978e5dcb8c15c16b6094b496be99dbe9498d9508c2d43273482aa85ad57ae603439c196025170ed

                                    • C:\Windows\{C99EB621-FBCD-4332-8CDB-6889EF325B44}.exe

                                      Filesize

                                      408KB

                                      MD5

                                      936e4f734c43f69ec374844a1726e9a0

                                      SHA1

                                      db238966d0ea1c265c3d5d0b409411f729981979

                                      SHA256

                                      cd477c7063f6df607d5e63e23372a1bc01fda5861fdb76f9f1a4626352ce1fb1

                                      SHA512

                                      5410205ccf7042eb24b8dd26f5962dbf54aaf6fa55b181ffb7d66ef32102a77804c8aaa1d2c78b667eb3914ac425f9d006c1b4fe23d840f89653014b8387566e

                                    • C:\Windows\{CE3F476B-ADEE-4d10-BF28-A33ACD01445A}.exe

                                      Filesize

                                      408KB

                                      MD5

                                      9c0e8d1c6e95fb30f3210b9a1e0d712d

                                      SHA1

                                      66f243d82bc5b07b29a5909e3dee681fca96fa86

                                      SHA256

                                      599d9248d7abe3425f2b9263afdbefc28e8d4b026a9f8d385be1dad204e6867b

                                      SHA512

                                      37cb4eb150e45f678cd4d86e3d788ae4501fe8be6ecd9f08640ea43fccf1f867a764da4365f5fe5741fab81fbfd16e6ba4d04248a6df1c3306c659677a912920