Analysis

  • max time kernel
    100s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 06:49

General

  • Target

    2024-01-08_ecd4b53631e983c33da2f6bb31061098_goldeneye.exe

  • Size

    408KB

  • MD5

    ecd4b53631e983c33da2f6bb31061098

  • SHA1

    27daaa7195c7bde30b46092da8e4335b0a04789c

  • SHA256

    b118ff36da43e8c3d04df058ea2b931d96e7a187698adf38aed8bbadc0e60663

  • SHA512

    17c78ba3fb73d854155cc93f9ac99860e6f485d8a90e3aa290e9f2932ebca70f159657e651f36b49519ee9a4dd00b6a4d1999de45c2c9d8b05d8fe0c8747509a

  • SSDEEP

    3072:CEGh0o6l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGAldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 16 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_ecd4b53631e983c33da2f6bb31061098_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_ecd4b53631e983c33da2f6bb31061098_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2548
    • C:\Windows\{2198385B-7FFD-47ea-A69D-79B1EF79F1A3}.exe
      C:\Windows\{2198385B-7FFD-47ea-A69D-79B1EF79F1A3}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{21983~1.EXE > nul
        3⤵
          PID:2712
        • C:\Windows\{ACBF2304-DFBF-49ce-9CC3-348E64CA3FB4}.exe
          C:\Windows\{ACBF2304-DFBF-49ce-9CC3-348E64CA3FB4}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{ACBF2~1.EXE > nul
            4⤵
              PID:2580
            • C:\Windows\{F816A313-AD21-4688-8022-C9BFF531985F}.exe
              C:\Windows\{F816A313-AD21-4688-8022-C9BFF531985F}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2680
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{F816A~1.EXE > nul
                5⤵
                  PID:2924
                • C:\Windows\{E6B802A5-2833-4087-8B06-86DA1F793F8F}.exe
                  C:\Windows\{E6B802A5-2833-4087-8B06-86DA1F793F8F}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2752
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{E6B80~1.EXE > nul
                    6⤵
                      PID:1576
                    • C:\Windows\{0F09001B-22A1-421e-A73F-4FFDC9710784}.exe
                      C:\Windows\{0F09001B-22A1-421e-A73F-4FFDC9710784}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2764
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{0F090~1.EXE > nul
                        7⤵
                          PID:820
                        • C:\Windows\{130A49E6-400B-4b65-B229-7D86FB6A6C0F}.exe
                          C:\Windows\{130A49E6-400B-4b65-B229-7D86FB6A6C0F}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1548
                          • C:\Windows\{1292CD29-3578-40c8-8306-07B700474C7F}.exe
                            C:\Windows\{1292CD29-3578-40c8-8306-07B700474C7F}.exe
                            8⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            PID:1364
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{1292C~1.EXE > nul
                              9⤵
                                PID:868
                              • C:\Windows\{EC7F891C-3EEE-4104-8900-C37C70F1E89F}.exe
                                C:\Windows\{EC7F891C-3EEE-4104-8900-C37C70F1E89F}.exe
                                9⤵
                                  PID:2760
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{EC7F8~1.EXE > nul
                                    10⤵
                                      PID:2084
                                    • C:\Windows\{9BB451FF-1399-400d-8B5E-DDF1F682FF45}.exe
                                      C:\Windows\{9BB451FF-1399-400d-8B5E-DDF1F682FF45}.exe
                                      10⤵
                                        PID:1136
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9BB45~1.EXE > nul
                                          11⤵
                                            PID:716
                                          • C:\Windows\{09AD035F-8569-496d-906A-4AA5E66AF481}.exe
                                            C:\Windows\{09AD035F-8569-496d-906A-4AA5E66AF481}.exe
                                            11⤵
                                              PID:596
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{09AD0~1.EXE > nul
                                                12⤵
                                                  PID:2672
                                                • C:\Windows\{D11684F5-8B99-452f-AE7A-1F57B3F2B619}.exe
                                                  C:\Windows\{D11684F5-8B99-452f-AE7A-1F57B3F2B619}.exe
                                                  12⤵
                                                    PID:600
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{130A4~1.EXE > nul
                                            8⤵
                                              PID:2564

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{09AD035F-8569-496d-906A-4AA5E66AF481}.exe

                                Filesize

                                82KB

                                MD5

                                ec217cda8bbbd603a3d5a8e75341122f

                                SHA1

                                4be4064e260d6b6acba18417e152c1a580eca0d5

                                SHA256

                                8149b4538f7c121c72bb428a4fcf78caf1d2800dd366e567b46846f6f90827ac

                                SHA512

                                612da5123f354afdf15fd8e932534417fa7ac8c9281011431f2aef6cb530834706ce28ad470b6a008c285f672602abdbc26f9b16311610f58a67e13ccd2f2e79

                              • C:\Windows\{0F09001B-22A1-421e-A73F-4FFDC9710784}.exe

                                Filesize

                                15KB

                                MD5

                                e861fccba6b265a4cee140c16845f760

                                SHA1

                                b5ca116fac9aa5280ad621d3849ee9cdec9a46c2

                                SHA256

                                fbce596abf9e2a28205945f5f7445a143c91835fec224a03072cdd42698310a7

                                SHA512

                                902f30ae99fecc1c482e56b38f85f61600aed49d327d8089dc319c805d5fe1d74d78cf1a3b2c141f01f0ec99f1d1c6707910572a3574bb19ec6a9024e7982a85

                              • C:\Windows\{0F09001B-22A1-421e-A73F-4FFDC9710784}.exe

                                Filesize

                                43KB

                                MD5

                                6e07eda5aeb2a14439ce15b791d55af1

                                SHA1

                                e0cc016645e7579a6634fe028aff7776ef1e62f7

                                SHA256

                                b3abc35825533b10a3b9d04c7b5647eb5f202b2e7b31c10c3ec99de0e521d3ab

                                SHA512

                                ff0e9fd2f06309225162766ee69300eb078c1f2574fe4cbad30bda60af26246f9dc54f30e9d95d7f79944a9941eee3692efe7d51d4a79645245449bada3cf14f

                              • C:\Windows\{1292CD29-3578-40c8-8306-07B700474C7F}.exe

                                Filesize

                                5KB

                                MD5

                                897f8900e6a2d2ca951117cc3b95f422

                                SHA1

                                409736eda0ee5cd7dfd0c2396c4725a031291055

                                SHA256

                                28b32be9ebce1eb87e5158906c1bf60ab7ed65498368309a798fed8eaea8cf8d

                                SHA512

                                6e56f2d22a6e32a1eeee2a7140ad258aa3499d45f22f2fd45d6be739db5eff66317e1ca8db430fccf0b5c3de27dda635f64ec9442eb89e52a265b572891b2bd5

                              • C:\Windows\{1292CD29-3578-40c8-8306-07B700474C7F}.exe

                                Filesize

                                21KB

                                MD5

                                7cbc5f42dfa21a1e8aa3e0a833a8277a

                                SHA1

                                20148bb556996c20a468b144de09e9979f4efdde

                                SHA256

                                f742d38b343f04ba99acbba30c03ac870380eb575be65eddb7f320b047d0aedc

                                SHA512

                                d5a5e3377127d1f4e69fc1959c2b1fc17c81c1211e86a4f0d3eb182a048a329e3b6deff8f13814215c02eabf96103afe484dad2fd68c7cf2637c0ba4d62b4bda

                              • C:\Windows\{130A49E6-400B-4b65-B229-7D86FB6A6C0F}.exe

                                Filesize

                                50KB

                                MD5

                                5b63da58e96e08ecca5b7c1c5c026994

                                SHA1

                                2722263fa59b0567f494dd6d4c2f14140c5c6739

                                SHA256

                                06838aec412f56720f2507e31cb270c03e6757092cf962daf1b764036d23b44b

                                SHA512

                                25d4ba95943a3f59e208a7e8e3cb2538025046201371cb4414ad282c5a52c68173c9810b33a7d2abcc9620e33abf88a6522235e1ab15c8819388bc87c16fc324

                              • C:\Windows\{130A49E6-400B-4b65-B229-7D86FB6A6C0F}.exe

                                Filesize

                                19KB

                                MD5

                                868ac2dc84f0d6619bd8ff05c75dc8f1

                                SHA1

                                191d907e1a2876712658ba9ac2cac617e6864a4d

                                SHA256

                                da7b528e5c0e35c83e7df25c9413665620416bee3e16e5fbddf179b5758e5527

                                SHA512

                                b03d085b5a18a58f49d5aaf0e9ebfd0b3517aa02884c561ab9f3aafed6fadc4e3e6a8a64b5a42aae11c90a848c675793403350f719178fa41a5d949398580d1f

                              • C:\Windows\{2198385B-7FFD-47ea-A69D-79B1EF79F1A3}.exe

                                Filesize

                                32KB

                                MD5

                                1765f961ad640a190ffa9a8fcefec466

                                SHA1

                                a5bec18bbaf41d9bcdc02a4514a74612f020d97b

                                SHA256

                                d08ad703a6d73b1c842340f324d09f2eeccf4f4170694ea272f2311ad2b4ff3c

                                SHA512

                                e1bb7d1583743dd49ec5138739ef0ddc84bcd16d211c01c8b8155cc9c445ffd6fb8eb0809c0e738bea35e70ccd2b162ec1d50f64cd286d2446d0e863669f9d3f

                              • C:\Windows\{2198385B-7FFD-47ea-A69D-79B1EF79F1A3}.exe

                                Filesize

                                39KB

                                MD5

                                75dc7797783d1f83b51102987b363372

                                SHA1

                                d3ba83d548934a0a7bdaf6d3de6320b7d62a4679

                                SHA256

                                057ce38b94b3fbbe39ce48c08fe1700f6b06a12c3e8906e88e62d9cbd98913d0

                                SHA512

                                35f74eee4433882b1192f9e25e15fe5022e2cb463d98d189b6cf830a241825399a5c799422f6ee566a837b8a87270744522eefc1e97af82d9a08dc2b56829de6

                              • C:\Windows\{2198385B-7FFD-47ea-A69D-79B1EF79F1A3}.exe

                                Filesize

                                79KB

                                MD5

                                bc63bdf3c75affd2d1eebf6f85a9e90a

                                SHA1

                                cb6569b1401739001a5340f34f11e8960e4e7ad7

                                SHA256

                                fa268a3aa9cabdd81774ffaaca1c719402be0405c7a0890aaa3d53dccb95ae11

                                SHA512

                                279d5eddeaa450562bcb8869eeb7de02e5a06ee45ad07e1777713452262438b97949d06832918d8e25b1e32f86a9dea3a7be7764c8b70bb2bbcc0f68094e8604

                              • C:\Windows\{9BB451FF-1399-400d-8B5E-DDF1F682FF45}.exe

                                Filesize

                                1KB

                                MD5

                                e390d5e1c9a5f95b99521de37c76e69b

                                SHA1

                                37cde85109a08b3b0d68aef382e00b09f3768e2d

                                SHA256

                                80ca884b931bb88ac3c9c819bf370704a34239361066e032d31c01fe2e1ee4c6

                                SHA512

                                fad1ef08769adc38455e2b5a614e36854b41144719f164202398888d97d387dac4c98de29088b222fb2756fe416ef6deb4fdf88649aa55ea91de4927542f8e69

                              • C:\Windows\{9BB451FF-1399-400d-8B5E-DDF1F682FF45}.exe

                                Filesize

                                72KB

                                MD5

                                fcdbd6421c779588bcb8782572b0afc2

                                SHA1

                                56d349f4fa7c92b5b4183d9f1ec521bda51c924d

                                SHA256

                                f4e199e1ed313652f0fde7810137fe650bfa560f0fcb0994f02dcab0afd6d5ae

                                SHA512

                                48ba94dd3f66f8c58d45bafd2adcdc2c35f2ebfd3aa4be9f6134769482a984e61529e085413adb7bbddacd5bbbab47cc65574b49c18de7703530e9e6d593fdc2

                              • C:\Windows\{ACBF2304-DFBF-49ce-9CC3-348E64CA3FB4}.exe

                                Filesize

                                63KB

                                MD5

                                6e1aa734fffcce075e9582bcad3a23c3

                                SHA1

                                13758e441081ebbdb7f72638842fde1c3247c271

                                SHA256

                                d7e4c659bcae05061e4ba7b9e208cd112f0a0c1980bfc337042eda4782fce15e

                                SHA512

                                8262d27282170a82e70d4347f8bb798d4f81fbd95aa8413addadc636636784895c0a1bf622a960a9e205220170ef85c4991eaf030701a9eda2819fb4fdd8de74

                              • C:\Windows\{ACBF2304-DFBF-49ce-9CC3-348E64CA3FB4}.exe

                                Filesize

                                28KB

                                MD5

                                b2d23b217e0288ded6d574ba01d9395c

                                SHA1

                                cd035e49028f8faf90a4d2f60c2e3acb42f37d6e

                                SHA256

                                3f0649285fc928922c4223b7b57cfa5c83168bf1910603c5a18e30b647587dae

                                SHA512

                                2d38150293c5206df1ea2beb87c95d5647547ef3cf32ab830706326b8e280ec08aa3ad705b9207691575b809c7f9f0082b83a623044ce9ac0102ecf85ae14567

                              • C:\Windows\{D11684F5-8B99-452f-AE7A-1F57B3F2B619}.exe

                                Filesize

                                91KB

                                MD5

                                ad5ca510ff87bedf90ad2820bbf59573

                                SHA1

                                e0f2af5c21c0c0b65a78fa1ec0d87096765b69c7

                                SHA256

                                be1d73ff7d7bc39d2574c0e82dfde1663c53c3557df241ec1d03ba5d520ddb1f

                                SHA512

                                6781294140354649c9d5ea7fc04410ec03f2258c0d0c4ddddc998bfb7de6ff888fb4b92f9590d47c586bed85081448917da9934ea83fb1191ce86b7e86f23265

                              • C:\Windows\{E6B802A5-2833-4087-8B06-86DA1F793F8F}.exe

                                Filesize

                                23KB

                                MD5

                                cc3f494bc086b982d2003be7378ed773

                                SHA1

                                9a29c393eeb329d08c4bebc1a010dc78c7852d8e

                                SHA256

                                e99d2728bf3fc8402f56cafc1c6d580452ba7db3a594d61c32691fbd39df78d1

                                SHA512

                                8a2e038edde620f08c1cd39dd9d67a64a4d04be866733532ecd0bb9aae5cc57802ab4b825075867c76a58f60de041a13ad27d5cc01659412f1df359455866c0e

                              • C:\Windows\{EC7F891C-3EEE-4104-8900-C37C70F1E89F}.exe

                                Filesize

                                8KB

                                MD5

                                b8ecfbe183a4808fd33644e402625da1

                                SHA1

                                987c0f3941ec164e422d1c35c94e2958acad5250

                                SHA256

                                03dd02e1c1c9a7d05022d669939cf780c5c25e4cc872b6b4898a9008a4871ea8

                                SHA512

                                58c335bd5ae844d0115cb900f5f83081aa58db4a4b2f9ae0edbd31ff99e480c79719e6346642936a22d5a0364959443d0c0336a52815872da225e93d5cd48da8

                              • C:\Windows\{F816A313-AD21-4688-8022-C9BFF531985F}.exe

                                Filesize

                                83KB

                                MD5

                                0dea869c801e1557062951c7bff2ffce

                                SHA1

                                821c323cb9cefbab3d287affb877da6f1c2110fd

                                SHA256

                                2a1145d77d1e3a2458bb9e7ed34a13fe78770150c39c2a1f892a218738ec2802

                                SHA512

                                d9b118f36595958133e397cdcb01f0e746cfa2e6aba44f12e4ca8532400710bcb0d15f128cd7060e56bdfb01efbf0fdc5e025a0e9bf1f4406e0104e197a56c5f

                              • C:\Windows\{F816A313-AD21-4688-8022-C9BFF531985F}.exe

                                Filesize

                                39KB

                                MD5

                                04ed0e6bdf4c033b72f603b5b73ceff3

                                SHA1

                                c0541344761719a5b3e6a32d0168c81c2a731ecc

                                SHA256

                                f918f2cf0f1b0c8608fbdd1df0ed786dee7bf46dbdf991ed841c906fafae46fc

                                SHA512

                                e2a9fae6f44498aa6db3ecdc277c48d548a736f8c97b25e013150aa6e189c434b82baf72e2b9c5b0f0c30243ca0e7784cbdcd1bdc87c84b10d3621c0d7e3217f