Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 05:49

General

  • Target

    2024-01-09_0e24a835f1878de60bf1d300e4ae1d1f_goldeneye.exe

  • Size

    408KB

  • MD5

    0e24a835f1878de60bf1d300e4ae1d1f

  • SHA1

    8255348bcd8349f850825089fe3b4d728d6a56a1

  • SHA256

    01b51bc50ab3fac97bba039bcf778aa4965626db8475765721fe259cbef146cf

  • SHA512

    06633ee2fa3067a8810894b229453ce36d5cc2cc1687f50678f1c99ea9ab727a310a59a8d5c2db9c3dba67fea4b2eb9055a1968303d3d28ea221dc3761ed6485

  • SSDEEP

    3072:CEGh0oRl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGfldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_0e24a835f1878de60bf1d300e4ae1d1f_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_0e24a835f1878de60bf1d300e4ae1d1f_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1952
    • C:\Windows\{E63D9897-8870-4bed-8CEE-B0089B7A1173}.exe
      C:\Windows\{E63D9897-8870-4bed-8CEE-B0089B7A1173}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\{58C4689F-6D0E-465e-A039-3380128827D9}.exe
        C:\Windows\{58C4689F-6D0E-465e-A039-3380128827D9}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\{C50AB4C1-7855-46dd-8177-C553FF65C329}.exe
          C:\Windows\{C50AB4C1-7855-46dd-8177-C553FF65C329}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\{2F4AD435-C55D-4058-90EF-FBCE3E8DA6CA}.exe
            C:\Windows\{2F4AD435-C55D-4058-90EF-FBCE3E8DA6CA}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Windows\{7F7A938C-BB14-44b6-8957-8D6FB9A2CEE7}.exe
              C:\Windows\{7F7A938C-BB14-44b6-8957-8D6FB9A2CEE7}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:324
              • C:\Windows\{8E4329F9-BB12-4768-A2DD-66F5D2FAAF51}.exe
                C:\Windows\{8E4329F9-BB12-4768-A2DD-66F5D2FAAF51}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:568
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{8E432~1.EXE > nul
                  8⤵
                    PID:2780
                  • C:\Windows\{71ED9427-8FEF-41f7-B01D-DB24682E27A6}.exe
                    C:\Windows\{71ED9427-8FEF-41f7-B01D-DB24682E27A6}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2636
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{71ED9~1.EXE > nul
                      9⤵
                        PID:2968
                      • C:\Windows\{20E68F74-5855-4d3c-BDEA-35FB056F1466}.exe
                        C:\Windows\{20E68F74-5855-4d3c-BDEA-35FB056F1466}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3008
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{20E68~1.EXE > nul
                          10⤵
                            PID:1652
                          • C:\Windows\{8E9818EA-1912-4339-BE38-BBE4E7A4E748}.exe
                            C:\Windows\{8E9818EA-1912-4339-BE38-BBE4E7A4E748}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1208
                            • C:\Windows\{1A069E43-61E5-4a62-A3A3-5051AE04D6EC}.exe
                              C:\Windows\{1A069E43-61E5-4a62-A3A3-5051AE04D6EC}.exe
                              11⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1216
                              • C:\Windows\{B71028D3-B0E4-4dbc-B8C5-B045B0ED80C7}.exe
                                C:\Windows\{B71028D3-B0E4-4dbc-B8C5-B045B0ED80C7}.exe
                                12⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1968
                                • C:\Windows\{598670DB-917A-4d13-9488-55E2B9CEAE7F}.exe
                                  C:\Windows\{598670DB-917A-4d13-9488-55E2B9CEAE7F}.exe
                                  13⤵
                                  • Executes dropped EXE
                                  PID:1600
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B7102~1.EXE > nul
                                  13⤵
                                    PID:1424
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{1A069~1.EXE > nul
                                  12⤵
                                    PID:2144
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{8E981~1.EXE > nul
                                  11⤵
                                    PID:2084
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7F7A9~1.EXE > nul
                            7⤵
                              PID:2988
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2F4AD~1.EXE > nul
                            6⤵
                              PID:980
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C50AB~1.EXE > nul
                            5⤵
                              PID:1892
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{58C46~1.EXE > nul
                            4⤵
                              PID:2592
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E63D9~1.EXE > nul
                            3⤵
                              PID:2860

                        Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{1A069E43-61E5-4a62-A3A3-5051AE04D6EC}.exe

                                Filesize

                                408KB

                                MD5

                                bbfb3163f9f5381e6ea02d60d04887c5

                                SHA1

                                8a2f96bd644415e12b91bfd53f3459f6cee44a16

                                SHA256

                                4809dd37786298bc8825a256e885daec47a011b66eb281c1b249cc0a07760263

                                SHA512

                                b61547672b55e968bddc5c0b888c17bffd3841ee12f1b02a88bd7af93384243f89e32cc61c3a94c1731f6736b0d38c63b030ea30c9fea320cecc0d65d2580fa4

                              • C:\Windows\{20E68F74-5855-4d3c-BDEA-35FB056F1466}.exe

                                Filesize

                                408KB

                                MD5

                                05941f3a0c5226998836541e16baf24a

                                SHA1

                                5fe24dbe6adc10c214d510a77e139c2992337d76

                                SHA256

                                47c919d0fbd6e38f8d4f138c18281f7c254cec0a87cdf526c099472fec8db96d

                                SHA512

                                7dd7d79026e97614a2f859ea7cf9ec1a0e6e852ae257af22a122a164b5ffcba13c96e8fbb6fd769b8f2830920f02f4755ee82bc776a88b86e819bac821a4bfdc

                              • C:\Windows\{2F4AD435-C55D-4058-90EF-FBCE3E8DA6CA}.exe

                                Filesize

                                408KB

                                MD5

                                1cb315da10e745976a5ed035d4a97e31

                                SHA1

                                37c9fd1741ff21381d6ef4ab382f5ce69a77d633

                                SHA256

                                99d67376cee14db6285e2d43a65132527aaf4407f80b5fb10aaea964761ac719

                                SHA512

                                1403918250e22a82fcccc91a023351ece39ade682849248c30d3ab3d2b5e588a895fc8026a3592e62f3e4281c39ede949615a31564d86dfca82bb86b4a76019d

                              • C:\Windows\{58C4689F-6D0E-465e-A039-3380128827D9}.exe

                                Filesize

                                92KB

                                MD5

                                f7386fa6477b89c68c31d8ba4f414fac

                                SHA1

                                d8d6ded88ead5a914fc5850357ad3678af0693c8

                                SHA256

                                bd2fbf2770ef385ea088a7e41a1dde550162b9f2a7e3fb504e50a608a11cdc39

                                SHA512

                                443230858ca1afb9c54b6ebe65f1b9be04203e0ba90a34a636886eb6155edc48bb774752cd936388e4b13f3baeeda5a3c157fe7bc503e937cfb5f8872c46da6d

                              • C:\Windows\{58C4689F-6D0E-465e-A039-3380128827D9}.exe

                                Filesize

                                408KB

                                MD5

                                596be364e9fee0cd3d4b489ca8b229a7

                                SHA1

                                63ecd7d752ca17867d8008680d201bc707123b58

                                SHA256

                                77769ad8a17c05daf3240ed7d5c75372ffea7437796ea5222d05662e8f47013d

                                SHA512

                                e4863d7759c658cf5b77b51596bbe304c83d797f0e6c46ad51410cedbbbbcd76c67e65cdbaeaca2911307c2b3ebda4477fd376bd02f22ce020aefafcd5900b11

                              • C:\Windows\{598670DB-917A-4d13-9488-55E2B9CEAE7F}.exe

                                Filesize

                                408KB

                                MD5

                                b4fc52f69ce591b02ee00701ddf4aec7

                                SHA1

                                4623bf0508186bd73b99a027fb0473183835a5a1

                                SHA256

                                c6bdf15621937cd0de6c7c7c22cb7f0d9df2333b47878e359335cb3c2b25807f

                                SHA512

                                b15e0b605bc1c9d90a80420f0c83c5f3bf835ff4ffe0f937ac4646abb54ed724c6b59eede40411462249145cc2b668985346bf46e5f477760f1f43eb71354f64

                              • C:\Windows\{71ED9427-8FEF-41f7-B01D-DB24682E27A6}.exe

                                Filesize

                                101KB

                                MD5

                                eaac00713fd04d8d4064055c0d83bbf0

                                SHA1

                                1cf4c37e30d18051761c5b7b210582b1112b84bb

                                SHA256

                                d25627aa010f36ecc6c60ab0d3d88f9dc0ffaa48519e0a504b07b9be36bf67e5

                                SHA512

                                ed005e72a094f983324f2cf5a6f29cacc1fcdc6ed00a0fdfd4b9e6843025b38f79c282d3d873634222b02dc4803d3cb843a1c42e9f8a33c6099a7aab4c48be75

                              • C:\Windows\{71ED9427-8FEF-41f7-B01D-DB24682E27A6}.exe

                                Filesize

                                408KB

                                MD5

                                22ecd6454c02447da15285e85b38cfd8

                                SHA1

                                9e0f375c86a13d4023686d03a3a4235647eaceba

                                SHA256

                                40a1cf0d09504664aea8d588c6113bb40e772fb9cca0b3c3c83d01377925eca1

                                SHA512

                                43cb7428aeb347c3c831719d6343c4cea3d298eeab04e85685e13cde51730cba3a0fa79516aa9f7db8009775c33b9f8b16ad4f5af8802f911700cbb055b2dd0e

                              • C:\Windows\{7F7A938C-BB14-44b6-8957-8D6FB9A2CEE7}.exe

                                Filesize

                                408KB

                                MD5

                                a2a8b1c18f132fa7fe0412872b146c3e

                                SHA1

                                bf07c0c00d996ba9937be1ca6bf5a278c284afc6

                                SHA256

                                8f86687bc45c0d471cd53e12926cc6bf4dd3b78b9dbaaf2b5addf9efdf9813f7

                                SHA512

                                8ca01b445946f0b5d1a63c292ddeca0b0cf1ecd8f6247f89c95cd15983801b8f0d0f1b7e0b1505db2dd30a6693a103e346fea0710f5c57b2b818b706974e955f

                              • C:\Windows\{8E4329F9-BB12-4768-A2DD-66F5D2FAAF51}.exe

                                Filesize

                                408KB

                                MD5

                                7b05324fcc79583369df99fe54250e96

                                SHA1

                                b1eb63e6ed34d57a2872c172c300391196c53344

                                SHA256

                                d5a6cd618e9c935749b16decb1e8e648593eb393820d5da6435e57c63ff45720

                                SHA512

                                c108b4088853bf6bc2f0ca85ba41bf6e92408bc604969c0be8fc75e0858190cab7f643db929099acd0aa87bf6ae5fe11861630450429faccd230e757455f4589

                              • C:\Windows\{8E9818EA-1912-4339-BE38-BBE4E7A4E748}.exe

                                Filesize

                                408KB

                                MD5

                                7c0fb4b46f515af7b38c7ebb8d6c62e0

                                SHA1

                                15c7fc6cb46cd80797d2de4241f38608e0ad4d8d

                                SHA256

                                e2578a923dfad8eef7e2f7a2fe70194d28faf0fe6f3f99ab124e583c183818d2

                                SHA512

                                12124c1d700983894bacf758464d13d4fcc34131631f046cc4047d485f6d0cf83b91a1f13c834342978071c83938babae371f506a3abdecbbccfb43a88469dac

                              • C:\Windows\{B71028D3-B0E4-4dbc-B8C5-B045B0ED80C7}.exe

                                Filesize

                                408KB

                                MD5

                                1a08e54aff16116c5c3925a12c23a78f

                                SHA1

                                bb8352c05c584981f40750f1bb42341c627e207d

                                SHA256

                                eb990828c5b463d6da487f97081a42b94ccdd1e1f2b473335df482a7478f40d0

                                SHA512

                                fd9546a7bb93e0fdbc795b4da04662d34c9e3f1ba1b11c3a30af5fa7ec20cd473c300a3da66a0d6b8e8566f846a3198b14a162cf1a0bd4787e94bbbaeda1a4fa

                              • C:\Windows\{C50AB4C1-7855-46dd-8177-C553FF65C329}.exe

                                Filesize

                                408KB

                                MD5

                                5b5ad5930426dfcc2daa7f51b33ded3b

                                SHA1

                                b82dc630d6286e9f034fdacee4fff9f7597b77aa

                                SHA256

                                cbe343aabad153ff53ac7866622314404f099af9318b1b5b1ca28e94d1aeea44

                                SHA512

                                0dc05b19558d815cc03708d0a065262c54e0ed265644474fbec6178d6d6b3d16df37bfe684cacb00a3b00875cf9e6a05051a75ceaae1e8ed34033ec7d4c76994

                              • C:\Windows\{E63D9897-8870-4bed-8CEE-B0089B7A1173}.exe

                                Filesize

                                67KB

                                MD5

                                b4be7052a030d2804387fcda0b927b9d

                                SHA1

                                566668a6e21b8b9bd854ebf117a24437caabb46d

                                SHA256

                                c330e876ad8a11841d5c10710eab309f71261b5ff48899abf3fd418585d67e96

                                SHA512

                                bcf57a398970e778ca59f2be5bd4d76ea8b81b6dee0920dbe4ea2f3c3e15d9ff9bb6461ecb59a80dcdec317ef22dc39ffcb380b64b0eeb82227fcc3a05c80690

                              • C:\Windows\{E63D9897-8870-4bed-8CEE-B0089B7A1173}.exe

                                Filesize

                                43KB

                                MD5

                                87653c6fbcb7ebba9b7dd35e6d4d4c88

                                SHA1

                                d9794b88338616d77cc7f9729223b86353200394

                                SHA256

                                cd2e36a0319b942a215938119158b94956ef1ef09f942cdb788da74ffc91af09

                                SHA512

                                36b55f31edef9b85b31e1e92ea0bc2b53c6135a2acce2ed3fcf6fd86646189cadc8b23aaae1f679f0023194a27acf860b5fb6f6553198eeb44300cf3521e105b

                              • C:\Windows\{E63D9897-8870-4bed-8CEE-B0089B7A1173}.exe

                                Filesize

                                136KB

                                MD5

                                d14c986f17ca7bb0b7ac75d1cddd0516

                                SHA1

                                a385ed6d3c50376464f105b9233503903f2d584d

                                SHA256

                                f90b45e23dcc4fd60754b9656217d93f0017464355514b326f971057532de960

                                SHA512

                                b1bfb49747cad9b3b9337925f4a4ed57f85caff93211c390ff105c7be0ee87c5fc12862da256d81d5cd3c8e98b3c5688b7b2eaa4ffa98bfff9b0f1f7385fe60b