Analysis

  • max time kernel
    63s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:45

General

  • Target

    2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe

  • Size

    180KB

  • MD5

    a1843772c6eab003d13513225d35f1b1

  • SHA1

    f18ec4a1d112485dcd24dabf04fd0a53bb11b3ba

  • SHA256

    510347b4687e4cc53e1bee9fedb6d5be85a9133f6ddabeda6d6cd5383504f0dd

  • SHA512

    663b1b4637f861786cd303820aa81fd26ca3c7a943986d673d4ed3c813ed9d72764625496cd766d2372f1c74a176df4ac5980d06e11399e3ad2d272cb9a3a9f6

  • SSDEEP

    3072:jEGh0orlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG1l5eKcAEc

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_a1843772c6eab003d13513225d35f1b1_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:2896
      • C:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe
        C:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:596
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{FC75E~1.EXE > nul
          3⤵
            PID:3208
          • C:\Windows\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe
            C:\Windows\{41EE12A2-A7CF-4519-9BBF-D5D056DBEE6C}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:556
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{41EE1~1.EXE > nul
              4⤵
                PID:3448
              • C:\Windows\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe
                C:\Windows\{B3289768-8F90-4d26-9CAB-1D466AADC6FA}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1780
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B3289~1.EXE > nul
                  5⤵
                    PID:3888
                  • C:\Windows\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe
                    C:\Windows\{739C23A7-BDE4-4d9e-973C-57AEC2AA2CA4}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2184
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{739C2~1.EXE > nul
                      6⤵
                        PID:5004
                      • C:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe
                        C:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe
                        6⤵
                        • Executes dropped EXE
                        PID:3616
                        • C:\Windows\{038C59E2-DBC6-4e37-8615-95D54FFBE281}.exe
                          C:\Windows\{038C59E2-DBC6-4e37-8615-95D54FFBE281}.exe
                          7⤵
                            PID:4880
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{038C5~1.EXE > nul
                              8⤵
                                PID:5116
                              • C:\Windows\{93357928-0FDF-4fec-B7DF-CA604F809471}.exe
                                C:\Windows\{93357928-0FDF-4fec-B7DF-CA604F809471}.exe
                                8⤵
                                  PID:3788
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{93357~1.EXE > nul
                                    9⤵
                                      PID:820
                                    • C:\Windows\{E6701E90-5717-4325-BECF-55D4FF66D92D}.exe
                                      C:\Windows\{E6701E90-5717-4325-BECF-55D4FF66D92D}.exe
                                      9⤵
                                        PID:2108
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E6701~1.EXE > nul
                                          10⤵
                                            PID:3852
                                          • C:\Windows\{7C229429-690D-48ee-87EF-CFB314E079FA}.exe
                                            C:\Windows\{7C229429-690D-48ee-87EF-CFB314E079FA}.exe
                                            10⤵
                                              PID:1180
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{7C229~1.EXE > nul
                                                11⤵
                                                  PID:1496
                                                • C:\Windows\{4B533170-8D3F-46b8-8332-92E9687A6BB3}.exe
                                                  C:\Windows\{4B533170-8D3F-46b8-8332-92E9687A6BB3}.exe
                                                  11⤵
                                                    PID:5040
                                                    • C:\Windows\{65855BDA-5517-496a-976D-2291BA1B48CD}.exe
                                                      C:\Windows\{65855BDA-5517-496a-976D-2291BA1B48CD}.exe
                                                      12⤵
                                                        PID:4000
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{4B533~1.EXE > nul
                                                        12⤵
                                                          PID:1284
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{010B1~1.EXE > nul
                                                7⤵
                                                  PID:2856

                                    Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Windows\{010B1505-7C56-4ea9-A995-4AD333177BBE}.exe

                                            Filesize

                                            180KB

                                            MD5

                                            ac2eb5eb3496932f928890d4a18e109d

                                            SHA1

                                            83bee97cc094ec7c37531e0e61e5ef2508c7a202

                                            SHA256

                                            9795a19a5f1cfcb00a478fdce5a772bcba72cbbe19ba85b71f6ba2a31adece89

                                            SHA512

                                            1b9eed2f9f33eb05acd0b787defeb57455f3fadb8eed20de50227273d2ecb7585504fd9c4d86bb9a9ac0a9c3e303d6cd010dc5b2762ebe2ead18d455360f9bbe

                                          • C:\Windows\{93357928-0FDF-4fec-B7DF-CA604F809471}.exe

                                            Filesize

                                            180KB

                                            MD5

                                            458cd699634240f2ac058c187ef891af

                                            SHA1

                                            e8e590c1f4719f1d7e8eec7c39a2912dbef4f594

                                            SHA256

                                            b22f0f89c8f52f1c1ddda0a715d56752cb9a5a533860f42d806e74e286733f46

                                            SHA512

                                            15f332353e7e18af4a579f17240163a8debb043a4e180840e5eb85a0d8eac04ee41859345c14affdee0a80baef757a9e9ff502869b09d23c7f982fd0cda6a8a6

                                          • C:\Windows\{FC75E79D-A3E1-4dbd-B1CC-34E40B930B2B}.exe

                                            Filesize

                                            180KB

                                            MD5

                                            0d571b23768e1725beb44b85e67d6254

                                            SHA1

                                            a77e0628f59803fc77c56b4ffa65eab363c03f37

                                            SHA256

                                            bebec18c916e100d4378adbfd7cf638977cd502eaeea8456a515378dfe3ee084

                                            SHA512

                                            37379289f8302a20c851c9cfeca08e246503a8771ad9c50cb502c7eb6d7540c54494587703759de6029fdcd3174001b510d7046de9c5f609748480f20fa59d8a