Analysis

  • max time kernel
    63s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 06:48

General

  • Target

    2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe

  • Size

    344KB

  • MD5

    d1d4f19b1f9c7f68d3e58717b4f0098f

  • SHA1

    d41998133044f5715daf7a72db5655cf2eb2abd4

  • SHA256

    d0f57f00f0a1177228642d40b4ae6bedda4b694e73aab3c3554619eea8df8923

  • SHA512

    d40ddf106862f6540aefc9dd830572ceeb3df2030d12a23aab574aaecfc3b42c7ece64c7d2aaddb21dd2f0b260bab2e3430d448ffc03f8098be5194c397efb27

  • SSDEEP

    3072:mEGh0oblEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGRlqOe2MUVg3v2IneKcAEcA

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:2008
      • C:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe
        C:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{FC6BF~1.EXE > nul
          3⤵
            PID:1336
          • C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe
            C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{BC9C4~1.EXE > nul
              4⤵
                PID:1160
              • C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe
                C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1908
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{914E4~1.EXE > nul
                  5⤵
                    PID:4588
                  • C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe
                    C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1060
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{E3BC0~1.EXE > nul
                      6⤵
                        PID:4760
                      • C:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe
                        C:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe
                        6⤵
                        • Executes dropped EXE
                        PID:1952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2D9FD~1.EXE > nul
                          7⤵
                            PID:3708
                          • C:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exe
                            C:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exe
                            7⤵
                              PID:5004
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{87BFF~1.EXE > nul
                                8⤵
                                  PID:2616
                                • C:\Windows\{3A48962A-609F-4514-B16C-04B4D44C252C}.exe
                                  C:\Windows\{3A48962A-609F-4514-B16C-04B4D44C252C}.exe
                                  8⤵
                                    PID:4796
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{3A489~1.EXE > nul
                                      9⤵
                                        PID:4940
                                      • C:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exe
                                        C:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exe
                                        9⤵
                                          PID:1084
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4B206~1.EXE > nul
                                            10⤵
                                              PID:2444
                                            • C:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exe
                                              C:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exe
                                              10⤵
                                                PID:376
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{6983A~1.EXE > nul
                                                  11⤵
                                                    PID:3508
                                                  • C:\Windows\{ACC9AADE-9694-4691-A105-3FDE320610B8}.exe
                                                    C:\Windows\{ACC9AADE-9694-4691-A105-3FDE320610B8}.exe
                                                    11⤵
                                                      PID:3460
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{ACC9A~1.EXE > nul
                                                        12⤵
                                                          PID:3848
                                                        • C:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exe
                                                          C:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exe
                                                          12⤵
                                                            PID:3032

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe

                                      Filesize

                                      344KB

                                      MD5

                                      ee8dc33b2884f4c58188e21f310f8d95

                                      SHA1

                                      2b483faf8cee84a6ba70ec27891c75958c4ddb88

                                      SHA256

                                      236027506e01522a3cecf128ac8dac0c403e7493d193b5b3de9b9f267dee90e5

                                      SHA512

                                      766a75b942dbd50c1fd42fd499fb123d0a4b1408706e580bb2d60f207c0e0f5055d872a6f1e8c0b229661bfa3491c56825b65a048990be2102c958497fe0d4b4

                                    • C:\Windows\{3A48962A-609F-4514-B16C-04B4D44C252C}.exe

                                      Filesize

                                      1KB

                                      MD5

                                      0469c37c06779c374b10516f746e54cd

                                      SHA1

                                      a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7

                                      SHA256

                                      42a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5

                                      SHA512

                                      8116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0

                                    • C:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exe

                                      Filesize

                                      29KB

                                      MD5

                                      31c5aab0cabe241b78146db5afce4619

                                      SHA1

                                      7250f5c87e8bb1b3dcf768c48b09faf2e128fd4a

                                      SHA256

                                      fd94ba83aa883557d00c0344399fcca637db2c2ed990490d3ab920085bef8883

                                      SHA512

                                      e8294516f959020156871f66d99108e8b4a9f4cdea2a5d5bf450501a1846b0ff101541b31f75f2a46c180c719835f32bfa7057c51dc1aaee022e72a3e2d907bd

                                    • C:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exe

                                      Filesize

                                      11KB

                                      MD5

                                      f12317aa126b70a926c52a6b1ae4cba2

                                      SHA1

                                      b82657bcbf88e35c66bceb2f30b69ef38ee95ff8

                                      SHA256

                                      421ca303c6ac2c95f15a061a6be570c0c60ed07ee0ea501731e6176c77e0da1f

                                      SHA512

                                      7c46303898c300a693af88dbf51ec9a9263e0d6f213cb0cfd8b941cfbe7d1807c4cbec79e9325ff8e6d76cc192a39d35ba3dc747a92650feaaebe21af7289aa7

                                    • C:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exe

                                      Filesize

                                      105KB

                                      MD5

                                      7971472133f9999af0b993ae4fb03c1c

                                      SHA1

                                      24d343a0138862a4766bfb1aaeb089b10d9e2541

                                      SHA256

                                      df2cbeac0dff39ebc72ffd744070bea357413ec92450486dec49ed79de340dd3

                                      SHA512

                                      5cf008bbb696760ea691f9476acf960a7a0d4202be9f4fc49df9f5ad1cdb56e3039513f9e8b2486414c97e18777c9bd4aae917b4487d1bc0d707fcb8a1be6491

                                    • C:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exe

                                      Filesize

                                      56KB

                                      MD5

                                      e2dbe35a74512511c5369b61e1b570ab

                                      SHA1

                                      57b93ffccdcf87ee044c6bb9b166a53333dfeee2

                                      SHA256

                                      7a6f772d76da1841ee1a64a2342a985cd7959ec6b3ee687fd992f95685be13ce

                                      SHA512

                                      aff9755620e0fd981156836e9189a0eaefaf5c8f88f8d3a208f6a1ceebf193aed34d9896d9ac21674782b55689d81a66ccfeebb23f944c4af60ab85730ce374b

                                    • C:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exe

                                      Filesize

                                      344KB

                                      MD5

                                      68f344955c696e8b207485f39f39d1ba

                                      SHA1

                                      f2ddefc3fdee99e7d7c0a9e45921192e33cbef07

                                      SHA256

                                      cbb35b2f299f246999d4f7bb45dc986eeff3e380c873ebe5f98a642fe9dc3d1d

                                      SHA512

                                      48e5802f8d14a4e519eeb8902a83c69e82f68e91844513a2d7acac50503199a04148bc390728ed36833adb811c905cfbbc778888018b83981eb0204b1e5ba37c

                                    • C:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exe

                                      Filesize

                                      10KB

                                      MD5

                                      4d1b3788b54d9b55b7f12202bf22df68

                                      SHA1

                                      9fb32301c8b1bea41ec4208108e613c6c85d59d5

                                      SHA256

                                      ea6a3a902826e7b62f7416662a99cc359724a51e6b7b8ddbe7a78eb4a693da40

                                      SHA512

                                      b327a4e11860c4ab0959abdb98e0333910a208811b01ce3ae3b07f5b8d07d398c2a29b11ffccaf0dc4ccf5ab0cfb35a162d6e1a46aad33f53cdc215a8353bafc

                                    • C:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exe

                                      Filesize

                                      24KB

                                      MD5

                                      82c55604589506eb98712a5fbbb4e17d

                                      SHA1

                                      c6ba1e3591dc132777be9d2d5d75f68ab1aa272e

                                      SHA256

                                      4bc96fde36af72dd5dbba0b76f245b7bb48eb55560a224beacb0cb4c38e96e79

                                      SHA512

                                      632d161529407fd462740fe2747df8bc700a1bdf125e9f38329d2c4fa8c4a4a8a58614dac7f72097728763b3a415d49ba0c1ec9c9f8804bf5bc80c420996dd05

                                    • C:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exe

                                      Filesize

                                      54KB

                                      MD5

                                      963f2bf39a995b04553b707e004a5112

                                      SHA1

                                      e02c912b09232669494dd671153ed76c01be6d7b

                                      SHA256

                                      201ddbbfce47396ce74eb1ac1b1521d5eb7f13f073f49bdc72abffc7086dbeb8

                                      SHA512

                                      34bb42719615ab9c52b48304bc0105967ac4b3b4263e163de6d41d4371261514fc28ff9fdcf94cfe49f930acc4be84e09c6219fca8a77bd3dabc2dbdbaa46548

                                    • C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe

                                      Filesize

                                      47KB

                                      MD5

                                      d21fff654338b0f7b19e7f8c82386116

                                      SHA1

                                      c05b2077459f17088c97fe2e7971a0fe8e898120

                                      SHA256

                                      abc6e833cfe9bfa358fd4b15ea9522632cd4954c2fa897190bdcc83ec1b68e63

                                      SHA512

                                      9f24770a2911f2ce3c340242df2ea6a164567d18c26269691b45a4545a7df9dad99ddee4e92ed34c33692bb2ba597283d46f42f9d6ea5f9adceb60d319730ce7

                                    • C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe

                                      Filesize

                                      96KB

                                      MD5

                                      8e3de64bf0053af0a2ef9cb9cf8cf01c

                                      SHA1

                                      47a77a2b35c33d5a0fddbe7d7e34668c98a0ac4c

                                      SHA256

                                      5a76f579f469f4c70e385f8c491879c788ec00f30b57858d6cbba62a630f6cbe

                                      SHA512

                                      f624088f0da54e1ac1f8ffb4a3447f9ef08325a1226dab4586c5fdc46fa80397774c56a6699dec25f5d828bc13338fc4237b1b62e7c5d889d4dbacf5537a7c94

                                    • C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe

                                      Filesize

                                      10KB

                                      MD5

                                      e871bdcf64993e56f4be26c98cd24fe2

                                      SHA1

                                      99a6dbac427f2a5178707260d7dacbef5c4afc0b

                                      SHA256

                                      1c39c4408cc6a985011af2c9125d514f7d998c068fe5f2c09f9700312702870c

                                      SHA512

                                      f36227e5a6ba70299b75cb378c79523c5653fdb85962c0ac0e25452e40b2ea2c3b14aa86a5ae0760a913910f02c61024c10dbc42b3c5311ab4331082edc27597

                                    • C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe

                                      Filesize

                                      30KB

                                      MD5

                                      0ddad1a9f287779d1b74cf5f079855f4

                                      SHA1

                                      577e168ec26b60fde50d966890f3a038e187ccca

                                      SHA256

                                      aaf64ffdc6790cf3ec363b598b6d164220788cbab169fb5a2c6ba2a71f04eaaa

                                      SHA512

                                      12874ba08a39555654023035b65f60203cf8f88601ade3738936deaf9ce71bf57191882dafa52a38ad10defdf8e1537f45454e5f0674d15759ea712364c8c986

                                    • C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe

                                      Filesize

                                      11KB

                                      MD5

                                      5186aafc15bef0e3d9f8fb70620abdd5

                                      SHA1

                                      2d2859ef09e408283c96dacf5dc4f4d6ccf70da4

                                      SHA256

                                      485a3a8f8d4e6cae5aad497ab26e9ff71b03b8b5a411b7f3a3316d70a486f8c7

                                      SHA512

                                      f5cb272c6131e6561ff56e569250e2e7fff00c92fa0df7416beed30b8265d06226148049eb771eb8b9ae8d318311bc89e9e7c1ee1e0e5ddf41a9b46359c9362d

                                    • C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe

                                      Filesize

                                      11KB

                                      MD5

                                      c830a2ce72869b0d43a58f582a7ac1ed

                                      SHA1

                                      4eb3472b8f7d9583db14b7e068ecc981e691388a

                                      SHA256

                                      73a61dea22131bd0d8ce70404e3806abb414eb72b11e2f2bec4045e80e0ce482

                                      SHA512

                                      6f42f4a98405c012e24cbc6d9ba15b510f45f4619941c9a225baae6d9401eb67e9e86dc4ce12c93f94ff1abccd54d8f57a28860497e583d24c9ce4247811294c

                                    • C:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe

                                      Filesize

                                      344KB

                                      MD5

                                      afc50fb9557c8de369443007d5ef9b88

                                      SHA1

                                      dd4310149faaad5b7b21c550a449519a0af44b86

                                      SHA256

                                      8bc8ece47aa37a6d2a4933cd60f5c6b1a9d250cdddda7c8a15762b40ea3d5909

                                      SHA512

                                      c75e9f8d032298a6891bcbe2a23bc6a15059308b7093f829cd883da227a701dfbac448e377e06282fd505d66adaf6f05f6e0c050dbd0ea4c43b31637c25ffea4