Analysis

  • max time kernel
    63s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 05:49

General

  • Target

    2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe

  • Size

    380KB

  • MD5

    08c358e0930b5d7785f00457394a94ab

  • SHA1

    9506715103e4f38763958366d94f34f180463184

  • SHA256

    89c3f09fa80e5aeac68bb851d108791f5cb62dfd54e0bf3140de275f6341d86d

  • SHA512

    84b5b9fc377bf7cd30246c49cf277749a59dc4a98374a4f8d6ff4278de7f14242a422027b5ce08dbfb9d75e5037880d3f883cff61fbd622df5ded8b4014ee25e

  • SSDEEP

    3072:mEGh0oHlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGtl7Oe2MUVg3v2IneKcAEcARy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:1252
      • C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe
        C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe
        2⤵
        • Executes dropped EXE
        PID:2680
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{40142~1.EXE > nul
          3⤵
            PID:3432
          • C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe
            C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe
            3⤵
            • Executes dropped EXE
            PID:1488
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{9296D~1.EXE > nul
              4⤵
                PID:3416
              • C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe
                C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4756
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{FD9A7~1.EXE > nul
                  5⤵
                    PID:4072
                  • C:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe
                    C:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2680
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{23227~1.EXE > nul
                      6⤵
                        PID:3416
                      • C:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe
                        C:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe
                        6⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1488
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{49E6D~1.EXE > nul
                          7⤵
                            PID:2852
                          • C:\Windows\{EC0F11A1-C5E2-4a2a-B94F-5DD39A2392A1}.exe
                            C:\Windows\{EC0F11A1-C5E2-4a2a-B94F-5DD39A2392A1}.exe
                            7⤵
                              PID:3288
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{EC0F1~1.EXE > nul
                                8⤵
                                  PID:1196
                                • C:\Windows\{9BF170BA-9B0A-453f-ACA7-1CB06CFD5A15}.exe
                                  C:\Windows\{9BF170BA-9B0A-453f-ACA7-1CB06CFD5A15}.exe
                                  8⤵
                                    PID:2444
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{9BF17~1.EXE > nul
                                      9⤵
                                        PID:3968
                                      • C:\Windows\{6997083B-3AB2-4609-87F4-F0CB55C77801}.exe
                                        C:\Windows\{6997083B-3AB2-4609-87F4-F0CB55C77801}.exe
                                        9⤵
                                          PID:412
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{69970~1.EXE > nul
                                            10⤵
                                              PID:4516
                                            • C:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exe
                                              C:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exe
                                              10⤵
                                                PID:1016
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{E43E8~1.EXE > nul
                                                  11⤵
                                                    PID:1464
                                                  • C:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exe
                                                    C:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exe
                                                    11⤵
                                                      PID:2496
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{CB422~1.EXE > nul
                                                        12⤵
                                                          PID:3732
                                                        • C:\Windows\{142D3231-D728-41e3-956B-02BA1CF3864C}.exe
                                                          C:\Windows\{142D3231-D728-41e3-956B-02BA1CF3864C}.exe
                                                          12⤵
                                                            PID:3692

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\{142D3231-D728-41e3-956B-02BA1CF3864C}.exe

                                      Filesize

                                      20KB

                                      MD5

                                      a9b945ac7ed94ce4296ef5f439771345

                                      SHA1

                                      818259b56b8a6b9fbc2e23ad62e05814c5a50994

                                      SHA256

                                      981d61b4e571ef86b6091f853477df1b30eacbc6fe3f3b4858eb3a82cc2694b4

                                      SHA512

                                      76cf5bf7c288a92b9e633c6d6227a53b945b144b71606a42c5ef0960421ec6148b42270eb963f4159024d17240fee960c6dfc20fdff7129f4a9350ffbd6efb70

                                    • C:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe

                                      Filesize

                                      12KB

                                      MD5

                                      2169b0929b9a6419f042ba1c6d385f3d

                                      SHA1

                                      486fcb175100d94a0cb8d5cf84071216380e3782

                                      SHA256

                                      ef1ec84705c5f578f7855bc54c4b9c308d9d62fef6cda95852071f2e8b616da2

                                      SHA512

                                      5e83949412f2c48392dea1907ce9f40111f12b8ca017e63b432038ecad3f691c54ae41ed4b2a97afd14af4abce5406c78e6ee2116d2ef289ca2ac48b1db73eff

                                    • C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe

                                      Filesize

                                      24KB

                                      MD5

                                      33a54c83bbd43eb0f803494dbfc668ca

                                      SHA1

                                      af3962bee72f381e55dfe44d5ac7dc194f85612b

                                      SHA256

                                      a9e958fe0a1b33ddf448e83f9affc45f8deb1e8584ac435e1f9dec1a3b2eeaa3

                                      SHA512

                                      80f07502263ab39b99c40680bcc569952caa7ceb096fc8a5abcec64c340eb8d9e5cf59ae67c8d1043615cdb66612751dc36c86a43b1dcd97dd0a37c4d23e9bdd

                                    • C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe

                                      Filesize

                                      203KB

                                      MD5

                                      53b89d431be25f8891dbe0f1045006fd

                                      SHA1

                                      e5224e6b5c22ca11fe6d845190739d30df8a56a6

                                      SHA256

                                      ae020a9f9b5284585d59086615e1506a21d7a4db939618b238e5fccfcb852fc5

                                      SHA512

                                      af518e749c8ca727b05d554be46c772330d1050635ba830760713a1593c684f41c71f4e9eec9b729b40ca7f03740dc2314b7a8859d638171f2fe30dc389e96b8

                                    • C:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe

                                      Filesize

                                      1KB

                                      MD5

                                      0469c37c06779c374b10516f746e54cd

                                      SHA1

                                      a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7

                                      SHA256

                                      42a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5

                                      SHA512

                                      8116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0

                                    • C:\Windows\{6997083B-3AB2-4609-87F4-F0CB55C77801}.exe

                                      Filesize

                                      51KB

                                      MD5

                                      1a6f04ada70f5972199794eb2d6bc45c

                                      SHA1

                                      c45d9cd83c62a6fd40a25804a5d9815e58e73099

                                      SHA256

                                      7c0c11b723d4a6f2a86d48162aa9257b2e0174118d2c5f3c561676a954f3af0e

                                      SHA512

                                      20ca47105a18352e1fcf38e73b8b6ce92adaa08e304d3af847c7de4f1d180183767ac399347e853c128ae5954194c8d52484dc1ddf5624447f566de7791c3854

                                    • C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe

                                      Filesize

                                      17KB

                                      MD5

                                      8dfc2bcbac13d9f57020e8254e02a49c

                                      SHA1

                                      c224738aa548a4efff3b0195af6a97140c69050e

                                      SHA256

                                      945eec9896b40f314ff5c38604272d38ebe71ea4e19710632653a2901664c110

                                      SHA512

                                      0042fcb41932e47d2429e4ded717d0a5b6d37fc7a7062adbd38d10f5a3132f76c784a4b48333f7677e258dfe15eade1fa7a47337edce4cfcdfdba3f90eb44b34

                                    • C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe

                                      Filesize

                                      29KB

                                      MD5

                                      77c79c68a3a30b26c7e7c49927d987db

                                      SHA1

                                      5f2ba9309dd059e4950cf2d53e3bf18c4de6d643

                                      SHA256

                                      37bd188e74dcf6fe06284d1a841e83f02fdb38caf826e25147d73306c0ab71f8

                                      SHA512

                                      891d8514eaf1c46a5b5fa18d7a52e1fd7703faa9df8eafcf9e9ebd63a2f6724efa49a60305e318c093f6d010bf0cb3a778523a41a3c497da90a44666a6c0a10a

                                    • C:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exe

                                      Filesize

                                      14KB

                                      MD5

                                      bea326680e370ddb3e2c36ae16f68466

                                      SHA1

                                      43747aeb231e7bd9e97766d261da9ff212f3a24b

                                      SHA256

                                      b8f77ffb10a237165327835705751124dba7da877bbb6ddbde54000f312bd2da

                                      SHA512

                                      fe388da742ab768ee03745dd7bc5adda53e547889fa931c941a9f9ae3494cc8457b10738d379cc4c469b36c9fa3f65a37ee66b0d8fa701e410eda0e645c72e51

                                    • C:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exe

                                      Filesize

                                      25KB

                                      MD5

                                      4f1bd23f20aa146d4643c2998d839aad

                                      SHA1

                                      c1dd7a5038958840a810ac974b40edb6ef41f266

                                      SHA256

                                      6eb77a40a761da0bd76eef51f7d7c00b13f47b885819ba47d6e1a54eec357340

                                      SHA512

                                      f976a4b7573c258c9bd96f45ac655cf088ae8ea8291111bb930d0df1ff493c500884333e24986317f27a61eb021118ad10751d32d84d516f6a455016c0be8ff1

                                    • C:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exe

                                      Filesize

                                      7KB

                                      MD5

                                      d1ffe34d26db696869f74484c41e0259

                                      SHA1

                                      ab90acdf04b83d685fae3b8dd95b9c7fe46643dc

                                      SHA256

                                      2feff586facf4f048e2d1fb8356c874142046838e60be821c9d5e0c350e01030

                                      SHA512

                                      b5b9ff3f3974f028288a412044350dde0767017140f1f9a60be7ddfb90df9e5d306dfee2cea44a8754858deaba76e82f266bc38c287835f4a0be87f48d7fc112

                                    • C:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exe

                                      Filesize

                                      91KB

                                      MD5

                                      07e86626752d5b0a14153a3ca91365a9

                                      SHA1

                                      ef51013b6aa105901aba25073180d2365dbe285e

                                      SHA256

                                      1328b1381ab9d26d9184ad01fcbeaa3870a8e3a8834fa15c74d8e66f6bf6d9e0

                                      SHA512

                                      efab064f231a8385f4ca516d2301408d32fb60e630a53519bda7d3e1c6e58050c462138a37b6f2c32b2f248eeb9b4508eec404598b8e4ca552d10770a95216eb

                                    • C:\Windows\{EC0F11A1-C5E2-4a2a-B94F-5DD39A2392A1}.exe

                                      Filesize

                                      46KB

                                      MD5

                                      9aed754892bbec5837865626d089b10b

                                      SHA1

                                      e8263f260381daae3eb6dd2f9e4b4ba8f9edf4e2

                                      SHA256

                                      648bba90654d78e58b32962d70b5e3d4a2c79ce4475a70bc1d41e78e6c59eede

                                      SHA512

                                      9b9b27d5b48984faeee80be12f942dd92ce83493dcadd70c861320049061a0ae4b0c9ddbbeb1004997eeedee954b07f18ac9299dbf5d45686ceda0e3a0c91d7b

                                    • C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe

                                      Filesize

                                      41KB

                                      MD5

                                      5bb4044df9048bf2f1a2751875d51b0c

                                      SHA1

                                      d0360ff6b9d3e37c222216ee3637470d26b5eb42

                                      SHA256

                                      ec5e7872babfc9d8c3ddf43c1e923d2ddbd278cabf355ed500a6a14113501b6b

                                      SHA512

                                      61b55c360475f9bef78312556984c1680c6b584fb167d41208db1581805cd505e0395eb7fe7976a93214be68b476bfb7240397891c1452510070df1445ee5dfd

                                    • C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe

                                      Filesize

                                      61KB

                                      MD5

                                      95e5d449792593b3bb832a7fd288e6a8

                                      SHA1

                                      2e287be972f78e6cefa046a8dbafe4c8bde09cd9

                                      SHA256

                                      a3530a9a20902af73dfb29b783f30f7ababb6079d788d76b219bd76a63b1d3b4

                                      SHA512

                                      2c6e48aa0a25a89bbcaaaa37255134a4e765c87af9007c7f41f51cdf82db8067a5c3fff5ea3b1bfc5118991b4c62b6d23b016f0c65d4e01fe058c708b11a61df

                                    • C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe

                                      Filesize

                                      16KB

                                      MD5

                                      32eae08a4c8b118ded5dafe5a88d6a26

                                      SHA1

                                      18c7ff2d68005bb473eee7c2e5128e5720208dc0

                                      SHA256

                                      fce1e4a29762295376b8b009153ef13b50e929eb0b0844f0d42a811e92b4de4f

                                      SHA512

                                      90f37d4b1bfdd90540ec2178c76368e2fa9d53b8b7849783c3fb586e4f2f68ed3cfab87a7ab1f1114ead1bb3877d65bd3483d2b391fe19e5dd52dfe028d3de8f