Analysis

  • max time kernel
    88s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-01-2024 05:49

General

  • Target

    2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe

  • Size

    380KB

  • MD5

    08c358e0930b5d7785f00457394a94ab

  • SHA1

    9506715103e4f38763958366d94f34f180463184

  • SHA256

    89c3f09fa80e5aeac68bb851d108791f5cb62dfd54e0bf3140de275f6341d86d

  • SHA512

    84b5b9fc377bf7cd30246c49cf277749a59dc4a98374a4f8d6ff4278de7f14242a422027b5ce08dbfb9d75e5037880d3f883cff61fbd622df5ded8b4014ee25e

  • SSDEEP

    3072:mEGh0oHlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGtl7Oe2MUVg3v2IneKcAEcARy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1876
    • C:\Windows\{60E3C17D-F86E-4520-B98B-FC4403D9C76E}.exe
      C:\Windows\{60E3C17D-F86E-4520-B98B-FC4403D9C76E}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{60E3C~1.EXE > nul
        3⤵
          PID:2604
        • C:\Windows\{B7C0467D-0488-43cc-92F8-D61C7CE4566D}.exe
          C:\Windows\{B7C0467D-0488-43cc-92F8-D61C7CE4566D}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{B7C04~1.EXE > nul
            4⤵
              PID:2760
            • C:\Windows\{BD76D489-EDD6-42ec-AF30-A454FD455787}.exe
              C:\Windows\{BD76D489-EDD6-42ec-AF30-A454FD455787}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{BD76D~1.EXE > nul
                5⤵
                  PID:2104
                • C:\Windows\{8DB86F4D-C137-462e-892C-A8282DBB16A8}.exe
                  C:\Windows\{8DB86F4D-C137-462e-892C-A8282DBB16A8}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2968
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{8DB86~1.EXE > nul
                    6⤵
                      PID:1848
                    • C:\Windows\{895752E4-7851-4014-ABE8-B0F6DB2E887D}.exe
                      C:\Windows\{895752E4-7851-4014-ABE8-B0F6DB2E887D}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2796
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{89575~1.EXE > nul
                        7⤵
                          PID:2376
                        • C:\Windows\{0068D21B-B3C2-429f-A777-728A81EFF834}.exe
                          C:\Windows\{0068D21B-B3C2-429f-A777-728A81EFF834}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1852
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0068D~1.EXE > nul
                            8⤵
                              PID:2856
                            • C:\Windows\{CAF4E3A4-1055-42f2-9ADE-824278B257B9}.exe
                              C:\Windows\{CAF4E3A4-1055-42f2-9ADE-824278B257B9}.exe
                              8⤵
                              • Executes dropped EXE
                              PID:2840
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{CAF4E~1.EXE > nul
                                9⤵
                                  PID:1196
                                • C:\Windows\{120D05AB-4520-4cc0-AA38-BA5B8348B11A}.exe
                                  C:\Windows\{120D05AB-4520-4cc0-AA38-BA5B8348B11A}.exe
                                  9⤵
                                    PID:1476
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{120D0~1.EXE > nul
                                      10⤵
                                        PID:2448
                                      • C:\Windows\{0E56F1C7-B0F1-43e3-808E-189CBDEC5841}.exe
                                        C:\Windows\{0E56F1C7-B0F1-43e3-808E-189CBDEC5841}.exe
                                        10⤵
                                          PID:2024
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0E56F~1.EXE > nul
                                            11⤵
                                              PID:480
                                            • C:\Windows\{45CDB4E6-40A6-44a3-BA80-E0488738BDBC}.exe
                                              C:\Windows\{45CDB4E6-40A6-44a3-BA80-E0488738BDBC}.exe
                                              11⤵
                                                PID:604
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{45CDB~1.EXE > nul
                                                  12⤵
                                                    PID:712
                                                  • C:\Windows\{BEF58E43-5AEE-4f68-A809-D0354BC112F2}.exe
                                                    C:\Windows\{BEF58E43-5AEE-4f68-A809-D0354BC112F2}.exe
                                                    12⤵
                                                      PID:576

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{0068D21B-B3C2-429f-A777-728A81EFF834}.exe

                                Filesize

                                37KB

                                MD5

                                5e03ee5d87a90ff5e9019861c63cbeb0

                                SHA1

                                e5ed2b90e6e014072a8edd53bb502c6946190822

                                SHA256

                                19eee770252b82d9a86bacbdc9c300ac5a2ebe98127ed24da82c2c3f53ebea15

                                SHA512

                                24d8dfd47d1a4c7bfdc964df7e2cc5849d4cb0f38b21ad5bba114eb269c910118eb884eba308b4dddc93442d0388395a47f911e36318d53076d43ff93acc2e47

                              • C:\Windows\{0E56F1C7-B0F1-43e3-808E-189CBDEC5841}.exe

                                Filesize

                                33KB

                                MD5

                                7efdc76ba0f71f25739adf2a0181c139

                                SHA1

                                b5eaf6a6c601caaaa89c1a9755eaab55911e52a3

                                SHA256

                                0e7aafaa5aa74e3d4a7af3608b1cc79e22462309b3778890a355105e7183dcfb

                                SHA512

                                cdc476203fa490ab6102f4ded7cff0b03f47d271baa9221c1d518fa502f113de2afbbbe116f45c81acc235e5481ea4870006f03446e7e8e17dcdd17e79967be5

                              • C:\Windows\{120D05AB-4520-4cc0-AA38-BA5B8348B11A}.exe

                                Filesize

                                17KB

                                MD5

                                473b4a8c8d58589b2915d078754f7e38

                                SHA1

                                3881ffecc0f3a92a9779c37df43d544401c3c0eb

                                SHA256

                                5fbec9782892273f9fd34e14c579a4c5827d2c776ad191e00e956df25807fee2

                                SHA512

                                a738533683d1ea7ec7ef41109910cdcfaffb5b07c97336bb3a1f873e3835638c216cbc6ff065b2b52e1b5871ebd03252e89d395a39effb2ee907b6b17165989f

                              • C:\Windows\{45CDB4E6-40A6-44a3-BA80-E0488738BDBC}.exe

                                Filesize

                                4KB

                                MD5

                                eb4c99746a30a78734f41a5d03b885c3

                                SHA1

                                fc778d90dab64309113e39008f1c06f4edb0d006

                                SHA256

                                8355bce55c4db5b46bbf3550c5be127bb58587ea7f0f1f35a5ffdf07a224fcec

                                SHA512

                                7f5cbc3fa95c76500327c89110d044db925aa6461da43839dd4872232a29d243d2947c7cb2b3c9c07dc43c183defd01d45bfb5f195ef16296199ca867cba2bdd

                              • C:\Windows\{45CDB4E6-40A6-44a3-BA80-E0488738BDBC}.exe

                                Filesize

                                380KB

                                MD5

                                f0be32d4572792018f60e0960d3471d6

                                SHA1

                                67ba3c64f7b45d52f56aadfea3ab4f8e889daac4

                                SHA256

                                11959adfe721257756218fac10d16fd329638090fd12d23be720f099bf8955a2

                                SHA512

                                981301e7b9149311d202cef375032899d1024c9f77372f47254a7738911628ae138da8687754c218e0bd03adcfb366cc636e541746a60bbf657efdacf8117c08

                              • C:\Windows\{60E3C17D-F86E-4520-B98B-FC4403D9C76E}.exe

                                Filesize

                                9KB

                                MD5

                                f80d4ecb898a65dc825094f2b88d325e

                                SHA1

                                b4e1c8c61fb561354805b2bedd490fc3ab3f97ee

                                SHA256

                                0a9b6d53a157d366e5eda18b1e48681fbccc5c9f6fc21f279a42943955e9e4ff

                                SHA512

                                21f8ec0a41b3d2c6422755b2d2042bcba7ca048ae32e755cdfb1f495818f48f1ac90ba212e8b5ae0b2b1b99d54234777713dfbd5827123b9a0335216e4daf460

                              • C:\Windows\{60E3C17D-F86E-4520-B98B-FC4403D9C76E}.exe

                                Filesize

                                1KB

                                MD5

                                0469c37c06779c374b10516f746e54cd

                                SHA1

                                a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7

                                SHA256

                                42a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5

                                SHA512

                                8116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0

                              • C:\Windows\{60E3C17D-F86E-4520-B98B-FC4403D9C76E}.exe

                                Filesize

                                26KB

                                MD5

                                b25a6b74059645f0f10c0e316507eb58

                                SHA1

                                21b194c24b1a99f33b5e6803fc22395a9e1d0094

                                SHA256

                                195dc9d31825e897f82b0589ba7bf8e09cc68e1fdcc5508d8e79bfdc1d1d43cd

                                SHA512

                                212374ad893a596a2763529d30a900076ce91ef8ffce2f9fe61915badff3b562527a609a3a41eaac360f54c18b9d667a7b1ab504fe92073c28fa625d502b5d7c

                              • C:\Windows\{895752E4-7851-4014-ABE8-B0F6DB2E887D}.exe

                                Filesize

                                16KB

                                MD5

                                57d6d27d1cc5be9f5e470a978e814461

                                SHA1

                                71b92780b599685af0f7e065139e011cd4841b9f

                                SHA256

                                9857cba356639e1eb371e1c9aca6387848b8ac005b59de5179e1a36bec3c2ba4

                                SHA512

                                23288047a1dee996df37520cd22a398e8667041616a926c3736e44304454926ac4df12569b4f4bb5a538f5dac7432fecf3ee5e0750e2636b64e4e9e1f56ddf49

                              • C:\Windows\{895752E4-7851-4014-ABE8-B0F6DB2E887D}.exe

                                Filesize

                                52KB

                                MD5

                                7f92856d2754b89eca06a6fa0137c815

                                SHA1

                                ebe98312c48f98a46f669279e759d446efb8dead

                                SHA256

                                1266f2b3c6fe32aa89b1834fd4987473e9735c83ab5682d867d025415ddc5762

                                SHA512

                                d32ee3863ef39e1091723d491253fa59436eeae64bc2b72300c67bf2b726512126664d700f249ad5b323cf3740ba08e3753feaa38cf172c75c16b65143b8146b

                              • C:\Windows\{8DB86F4D-C137-462e-892C-A8282DBB16A8}.exe

                                Filesize

                                5KB

                                MD5

                                7b75e3026782df110d7a5fa2166ff764

                                SHA1

                                78e104780270877d95738c97167af944371ae19b

                                SHA256

                                508eca70968bc2ffbd35e4119297bd773e676a4b92564e2dcf10e6ed40066d39

                                SHA512

                                c6f8551a9e2526c58418eebb1d4484650c45e75e2850be8644a18d6ac854cf598f2375a2c00adcb12d2c900ad9c682717de4654a7032ecc4493424344781d7d5

                              • C:\Windows\{BD76D489-EDD6-42ec-AF30-A454FD455787}.exe

                                Filesize

                                51KB

                                MD5

                                5f8fe5a59727a01230b8fa87c94290c7

                                SHA1

                                3b3d99a612d8c91481a9421aaf961165173ce06f

                                SHA256

                                510a5046de5254039d7b62c741b08a2a12f7e52e31dd50f7612696f922b9f54f

                                SHA512

                                bcb9075760b85d4680a4e8914eddb6decd2505a9cf3f785dc9e55ae2a2ea9e6545186cd91d737c56bfb9dcc683c0a5e8cd88023445f7cc9b80bdf05933802f2d

                              • C:\Windows\{BEF58E43-5AEE-4f68-A809-D0354BC112F2}.exe

                                Filesize

                                380KB

                                MD5

                                3e178b43f506fdad83f5ac78c4b80d75

                                SHA1

                                e1c17259ced79549f47bfd252017067d4877ff1b

                                SHA256

                                f998af84bb9daab9e05eb5cfde623922fe576801577873e5dcbceec8ebaf5983

                                SHA512

                                3e70bec0b49bec7a123df57aadf5dda04e378e0e6fbfa1246c149e888bdf9c1fbaba71357566af7b96aba1cab9df278afdc91d4de2382a2b1af56a88c8c0de04

                              • C:\Windows\{CAF4E3A4-1055-42f2-9ADE-824278B257B9}.exe

                                Filesize

                                27KB

                                MD5

                                045e6db699f75a81a290ec675bad8a37

                                SHA1

                                a23207797f866dda7fc296c82b8812b21bf453ea

                                SHA256

                                4020eb68fad3601ab9618c95844270c2de6ff9101df0570f9b61b8f3797f4ab3

                                SHA512

                                48853a03afad171e4f34626446862096ee71399af4173a8afc8b369053ce60ecf75e1a595a87a55b21c1a8f628d7ec1a98ea92194dc92f8101c8e8bc245a0ffc