Analysis

  • max time kernel
    88s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 06:46

General

  • Target

    2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe

  • Size

    372KB

  • MD5

    b14a1a57449947a1ad221f68e2905fef

  • SHA1

    f3cc0e9e4cb1138d8402b8d2586dc9f8eb636b23

  • SHA256

    abfdcb4b1138e3e176c36cf8dc0dbe611b90e063bbd9994b5837f02d0702c1c5

  • SHA512

    392c8ba05f275a37895962b06e12cd8c6d5c1c761dd35863699cda5c8180b0dbc69981c1ca3b7490da1434ff82779917012a0599f0ae2e4df73f02a48d2a7e68

  • SSDEEP

    3072:CEGh0o6mlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGVl/Oe2MUVg3vTeKcAEciTBqr3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_b14a1a57449947a1ad221f68e2905fef_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1692
    • C:\Windows\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe
      C:\Windows\{BDBE28C5-19CF-472b-A7F1-DDC5626F9A41}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{BDBE2~1.EXE > nul
        3⤵
          PID:2688
        • C:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exe
          C:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2784
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{05872~1.EXE > nul
            4⤵
              PID:2848
            • C:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe
              C:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2652
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{845D8~1.EXE > nul
                5⤵
                  PID:2372
                • C:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe
                  C:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2976
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{EF7E5~1.EXE > nul
                    6⤵
                      PID:2956
                    • C:\Windows\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe
                      C:\Windows\{60086EF5-DD9C-4bb6-A9B8-A6305CBF3BEE}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2776
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{60086~1.EXE > nul
                        7⤵
                          PID:1744
                        • C:\Windows\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe
                          C:\Windows\{C4EAFFE8-7852-4c82-B0A2-58650D41944F}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:1196
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C4EAF~1.EXE > nul
                            8⤵
                              PID:1644
                            • C:\Windows\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exe
                              C:\Windows\{6992D193-2D53-4bab-BB37-7372EBCA6BA3}.exe
                              8⤵
                                PID:2196
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{6992D~1.EXE > nul
                                  9⤵
                                    PID:1388
                                  • C:\Windows\{997CC038-10E0-4d55-B3EF-62153C548514}.exe
                                    C:\Windows\{997CC038-10E0-4d55-B3EF-62153C548514}.exe
                                    9⤵
                                      PID:2604
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{997CC~1.EXE > nul
                                        10⤵
                                          PID:2200
                                        • C:\Windows\{5FF7743D-2971-422a-86FF-0E8061E6CF2D}.exe
                                          C:\Windows\{5FF7743D-2971-422a-86FF-0E8061E6CF2D}.exe
                                          10⤵
                                            PID:1972
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{5FF77~1.EXE > nul
                                              11⤵
                                                PID:2204
                                              • C:\Windows\{F3FFF39E-CAAD-4b23-B6E7-7433FD98C614}.exe
                                                C:\Windows\{F3FFF39E-CAAD-4b23-B6E7-7433FD98C614}.exe
                                                11⤵
                                                  PID:2624
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{F3FFF~1.EXE > nul
                                                    12⤵
                                                      PID:1480
                                                    • C:\Windows\{586643AE-F613-41ee-8276-D502C72017EA}.exe
                                                      C:\Windows\{586643AE-F613-41ee-8276-D502C72017EA}.exe
                                                      12⤵
                                                        PID:580

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{05872502-448B-4412-A7A7-19BA55288C8E}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  89a26ced15d3ecb6c3de671840ea4005

                                  SHA1

                                  f7c2ce7754f12c556ea76c24b27a273689979275

                                  SHA256

                                  003cf904f0b74e7282e28acbc511a618c5c5e4002be4e6467aa23661589444fa

                                  SHA512

                                  9c5d3934c7319dbc54e219ebfea08e3bbedf1b5a3c2ac959272004d5ecdb86c33572761ef88a18e520a4cce083387e0efb9dea736d59ed8ed71079451c51a5d7

                                • C:\Windows\{845D8AA7-3FD3-43f7-873C-155E55C8AFB0}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  33cb83ba285e01029a1e15196c1bfbf8

                                  SHA1

                                  bd915f673ae9c02dc89dd38ede963c628d1891b8

                                  SHA256

                                  61ff43c6a256c2842b688f619dcb888272909675c28a46f3d331d39001450657

                                  SHA512

                                  0afe4a665ba5c3453888f2f069b33764865aa5c1f645dc0c2df24ca8c874d2ba88e80c43c8515162b95a0ffba2f919b94dbd60f4e8eaed6f2df9431fd18f089d

                                • C:\Windows\{EF7E5BE0-B954-4dc8-9D1E-5CF6236B5640}.exe

                                  Filesize

                                  372KB

                                  MD5

                                  3df803bd4307cf2af242cdb09b9636b1

                                  SHA1

                                  406b89774ffe64f0139715321672286377489f58

                                  SHA256

                                  2b8ed60940a0658f44760365aacdaad8bb3b8d5a8172d44231676af6a96735fe

                                  SHA512

                                  67fb40df2a46007c7ca21ea2585f3d22a8cf1f08cb67abd6de848f07f473a5ab2b42acf21aa3a76b7aeae92ae0f399a73242e5b6e50726048df56dadefcdf800