Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 05:55

General

  • Target

    2024-01-09_64af9364d16efe66322814e5f0f5c107_goldeneye.exe

  • Size

    216KB

  • MD5

    64af9364d16efe66322814e5f0f5c107

  • SHA1

    5e8d24396ed2c26a0f61630038ff2aa9d4aad44a

  • SHA256

    885c5c6c97816ea652c0aa76ca4b2ccdc7eded6e4d126e610e114c1b5dcacf77

  • SHA512

    4ee481e21ee753fdc7950ab91c70f21fe764c3bd7ad329cb21b2551e3b27c47ef6f7b15da21b340bfa35a530c7448c5a9c80d86701dd2e5c82958c66626cff43

  • SSDEEP

    3072:jEGh0ofl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGNlEeKcAEcGy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_64af9364d16efe66322814e5f0f5c107_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_64af9364d16efe66322814e5f0f5c107_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:2064
      • C:\Windows\{2202B763-E47D-440f-9B87-30E81C22E57A}.exe
        C:\Windows\{2202B763-E47D-440f-9B87-30E81C22E57A}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{2202B~1.EXE > nul
          3⤵
            PID:1944
          • C:\Windows\{0281E0E5-1FB2-447c-BD81-9F9CA912FE1A}.exe
            C:\Windows\{0281E0E5-1FB2-447c-BD81-9F9CA912FE1A}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{0281E~1.EXE > nul
              4⤵
                PID:4784
              • C:\Windows\{639CE35A-11FE-4503-81FF-89DBCD0C8F10}.exe
                C:\Windows\{639CE35A-11FE-4503-81FF-89DBCD0C8F10}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1844
                • C:\Windows\{D4080C67-B219-4bd0-AFF1-C06E0381F0FB}.exe
                  C:\Windows\{D4080C67-B219-4bd0-AFF1-C06E0381F0FB}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3964
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{D4080~1.EXE > nul
                    6⤵
                      PID:2312
                    • C:\Windows\{9D5737C9-AE1A-4e22-A27C-485E516DD3FC}.exe
                      C:\Windows\{9D5737C9-AE1A-4e22-A27C-485E516DD3FC}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3008
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{9D573~1.EXE > nul
                        7⤵
                          PID:1952
                        • C:\Windows\{B645C9E8-BA20-4915-96BB-062C7193113E}.exe
                          C:\Windows\{B645C9E8-BA20-4915-96BB-062C7193113E}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:60
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B645C~1.EXE > nul
                            8⤵
                              PID:2688
                            • C:\Windows\{189C1C6F-9631-4c4f-BE72-3395D9554E05}.exe
                              C:\Windows\{189C1C6F-9631-4c4f-BE72-3395D9554E05}.exe
                              8⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4988
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{189C1~1.EXE > nul
                                9⤵
                                  PID:552
                                • C:\Windows\{FA9C32D7-1529-4e6a-9A85-FFC9BEE0AC15}.exe
                                  C:\Windows\{FA9C32D7-1529-4e6a-9A85-FFC9BEE0AC15}.exe
                                  9⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4668
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{FA9C3~1.EXE > nul
                                    10⤵
                                      PID:216
                                    • C:\Windows\{7B8B4E2E-94DA-44cb-8E0A-FE8F0F721575}.exe
                                      C:\Windows\{7B8B4E2E-94DA-44cb-8E0A-FE8F0F721575}.exe
                                      10⤵
                                      • Modifies Installed Components in the registry
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:3868
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{7B8B4~1.EXE > nul
                                        11⤵
                                          PID:3552
                                        • C:\Windows\{A1B31FD3-6EEB-4e86-926F-8FDC874AC98F}.exe
                                          C:\Windows\{A1B31FD3-6EEB-4e86-926F-8FDC874AC98F}.exe
                                          11⤵
                                          • Modifies Installed Components in the registry
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1512
                                          • C:\Windows\{B461606E-666F-4ad5-ADFF-BDBE8930389E}.exe
                                            C:\Windows\{B461606E-666F-4ad5-ADFF-BDBE8930389E}.exe
                                            12⤵
                                            • Modifies Installed Components in the registry
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1876
                                            • C:\Windows\{F71C0E72-6470-4ec3-80E8-67BD82180E2F}.exe
                                              C:\Windows\{F71C0E72-6470-4ec3-80E8-67BD82180E2F}.exe
                                              13⤵
                                              • Executes dropped EXE
                                              PID:936
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B4616~1.EXE > nul
                                              13⤵
                                                PID:1348
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{A1B31~1.EXE > nul
                                              12⤵
                                                PID:4068
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{639CE~1.EXE > nul
                                  5⤵
                                    PID:1956

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{0281E0E5-1FB2-447c-BD81-9F9CA912FE1A}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  0cd268a2204754a5893226c98b6a7a9c

                                  SHA1

                                  4c5fbde215e870c1388a3a7aa10e156b000d0e19

                                  SHA256

                                  693e9e54537305e3e1f50270573046afe7099ad3735c71a80829b84d9b54fb91

                                  SHA512

                                  dd00209f9699184bd89411883247853fdfb4d49c4866fa771b8fe8199fab05262df88dd0daeb9d592fb4642ae30a49a97cdf307f0bb246bcbc575fbe3b5d360f

                                • C:\Windows\{0281E0E5-1FB2-447c-BD81-9F9CA912FE1A}.exe

                                  Filesize

                                  92KB

                                  MD5

                                  a8a19d2446523cf5c66c1a40e82a6b3c

                                  SHA1

                                  898c5057ade61c07c29284791ed1cee89f602868

                                  SHA256

                                  fe644eb5a6af4b1c9789df0338a7f6fa9fc9b949c5a9b753b02c39f430a1dbf7

                                  SHA512

                                  76f0ff3e080e9108f66f5b38179ceaadd9b3878ce713ccaffb3119a82591ce8623f56e90448069adf26e39a77b8cbfb7a695aa8db51c793828d17d6a6360299c

                                • C:\Windows\{189C1C6F-9631-4c4f-BE72-3395D9554E05}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  2111e20dacd6f74cae70bb76c783ce5c

                                  SHA1

                                  931bc4ac93d9ce90be4c9c1d62ea0d1d8389f1d1

                                  SHA256

                                  cd5f3672f309f74912afdbc3d732d2d6bfd6a2b6ca2eef2c1b2b2519f7f86ef9

                                  SHA512

                                  08dd4565e28844157c11cbabfe6407e26b8847d681d2305da591c3398f43ef57255811ffead63550118246ba4a4d5c94c5e03be4aad357e7160bee60d051477f

                                • C:\Windows\{2202B763-E47D-440f-9B87-30E81C22E57A}.exe

                                  Filesize

                                  92KB

                                  MD5

                                  0e817bb052dea83eb6cf1837fcd4cad2

                                  SHA1

                                  ef200ccf5adbb063de8310333d08d7ac85762db9

                                  SHA256

                                  70841ee490a383391094f74cf8e4772dd631196a26f5349262bf48d807242b33

                                  SHA512

                                  5c51465e0e27e85a42adcd4a5bc3973d1c57ac5a366876f1a183abf12eb50939187915160216d0a72efca16b2bd1f2dd5d2a271c5b76d51eb8e3d5486a5579de

                                • C:\Windows\{9D5737C9-AE1A-4e22-A27C-485E516DD3FC}.exe

                                  Filesize

                                  65KB

                                  MD5

                                  1329d3d373625a19a936bccf3daecc04

                                  SHA1

                                  12910d5ca3396c2b3f3b49057a018c24fd48f19a

                                  SHA256

                                  3b1f4110c731b10ab04f01f1144002e6147d131729a818aa3eba4f465642c42b

                                  SHA512

                                  d687010e21e02794bd240352ae25bbdf35de3416c68ff9e39ade20aa6d2f0a50138558748293b913a8410835221841a8fd023318b5a897c76b8ca33fbc15240f

                                • C:\Windows\{9D5737C9-AE1A-4e22-A27C-485E516DD3FC}.exe

                                  Filesize

                                  149KB

                                  MD5

                                  a26f85c4f359b428e411efade037f2bc

                                  SHA1

                                  7c96656e7a79000da2d8c10b037e2f41de05a69c

                                  SHA256

                                  02ce5b726b872882f1cf82bbd59108ad8358b9e7ab65305504ccebfcdfbc187f

                                  SHA512

                                  8dd0b0f35ce181e101c60ee3f4bb5800e345e80f9693f1690e058e83f33d44aebfc197fbf9cb2a4487a4a19118e14f91756b7c57e90921ea035330fd5b7908bc

                                • C:\Windows\{A1B31FD3-6EEB-4e86-926F-8FDC874AC98F}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  a87b645ee6a1820e494d0d140db21142

                                  SHA1

                                  a7f642a84ebff171f2f920106366d24179395497

                                  SHA256

                                  85d63aacc0bdc6559d1ce60810315fd4ffbe0f55d235b6610a76a5c5226a9158

                                  SHA512

                                  0749f27ddc683f6d72316378563d2ea13ae10ef65302a90c0d1bf9fdae3c755c03c477382852273dd21db9fdeeed480eac3c950ea9d80433dc50a72d983cfbb0

                                • C:\Windows\{B461606E-666F-4ad5-ADFF-BDBE8930389E}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  40e974307b5de3bb0536ca88d018d4ed

                                  SHA1

                                  43728fe4da4ea43d708e37467e15e3cf793771ba

                                  SHA256

                                  0de2f18a72b20be7f2ab043c6356cca39287b9db86aae1f8e4d4018fbecc2c7c

                                  SHA512

                                  f39096451af60d8d5702288fa8262487e256828701eb4e43a81edbbb1356d2c157b49442e4ad41e7eae490e44584028d465d1dec98369a36473351c15e440e3c

                                • C:\Windows\{B645C9E8-BA20-4915-96BB-062C7193113E}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  c4776fd6ce768915db89f6c220c74b76

                                  SHA1

                                  ffb3408f331d3ac563cccdd375e3207671933310

                                  SHA256

                                  dd2b90b85d83cdacac45567250b4ca743fd572d8cd6bd4f9c064162ce90c766d

                                  SHA512

                                  26dd3b5eea03ec238ed49441fa5337cd4186bb1c3bf5c00ea260d6d636d3e10504f3dab118481fc829060d00df15ef6334b90fc5258d5a54381a2f8e0fd48372

                                • C:\Windows\{D4080C67-B219-4bd0-AFF1-C06E0381F0FB}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  2680b48b94b5d9171908f27f203489cc

                                  SHA1

                                  c8c45a8f215c72c34b812c49319daa437ca28dfc

                                  SHA256

                                  1a35f1a6a215abbcb1b8523ba8926961fcba0e7d59d4d4b12de7617c20e29401

                                  SHA512

                                  b0845a22bddecc54cb842c3d337b08aaac77e937ed3f9298c7ba2b000b9e182c2f5f63726825c72c5d3df7c77610b8e906a8cbc1cbc9880c1534ea452da4bbb1

                                • C:\Windows\{F71C0E72-6470-4ec3-80E8-67BD82180E2F}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  a448a765517b39b8ad0aba105d63aa95

                                  SHA1

                                  791e32bf612b52b6e7936ba803ba575723380826

                                  SHA256

                                  1664abdf7bf458cf91bf866e8ac8ec9112897b556dc3298cf12ba4f62ac114ff

                                  SHA512

                                  f6e63f325324e36b746dde875552332893182a0fb01599b5c03e89832232dc4bdbedc94b08627bfa1c3063e14e2ee9bf100091a8685922d0173041a2e44ac753

                                • C:\Windows\{F71C0E72-6470-4ec3-80E8-67BD82180E2F}.exe

                                  Filesize

                                  128KB

                                  MD5

                                  ff44ea62a4f1e6ef8b3316bb1acf5657

                                  SHA1

                                  687a8f90dbb164d69d279a132747251331c408f2

                                  SHA256

                                  a221f9984b1ee0e396b9ca2d62bdacf69e68cb218223e6e344118acbd3c05f4c

                                  SHA512

                                  3c25bfaba692b8b43b59166e6b8db50b783604130aa9e4d77fe91a80ebbe8c331314ecb42a613d6ed2b7b0b771bef07cdaf1fbc53ee37244c29c85e945570919

                                • C:\Windows\{FA9C32D7-1529-4e6a-9A85-FFC9BEE0AC15}.exe

                                  Filesize

                                  216KB

                                  MD5

                                  91cdbc5bb2d6b45fdd1ef274531e32e5

                                  SHA1

                                  1f454b3f90343d43311c3c42970588f796df1393

                                  SHA256

                                  b525eb2f3a340fbd3dab919199cc676e15ee1b445f3959c97964a81ea0ac645b

                                  SHA512

                                  eba70da8cb3c0812a3389515f8a1f382084458edfdcbecf00fb83ec12689fcf98a11a5eba106b1aff72fc0cc8e32b6a329c096dcd73a76184a639cc40485f3e3