Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 06:04

General

  • Target

    2024-01-11_a85a7770d21302a2e2cacf1bb2403108_goldeneye.exe

  • Size

    372KB

  • MD5

    a85a7770d21302a2e2cacf1bb2403108

  • SHA1

    cf05e8b5a0f5ce02cde942f0de15a49047600089

  • SHA256

    1a408f20ee16e900bd6e2449d6448738309b91f4a3f9bd2c131b2e2e070df0ad

  • SHA512

    af815bd963b0c9c40d1ba8299a865158e37c667c59d255284ddc33cb1156fc8653baf285c4073500c0a7e11c5dfe6f38d76d0b0d9cc863347ab432e3685823c0

  • SSDEEP

    3072:CEGh0oflMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEG9lkOe2MUVg3vTeKcAEciTBqr3

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_a85a7770d21302a2e2cacf1bb2403108_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_a85a7770d21302a2e2cacf1bb2403108_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\{5587ADF8-4D36-43d4-A92A-2DCAFA311B0F}.exe
      C:\Windows\{5587ADF8-4D36-43d4-A92A-2DCAFA311B0F}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\{4FFDA76B-AC01-448d-B035-5338BF697FE0}.exe
        C:\Windows\{4FFDA76B-AC01-448d-B035-5338BF697FE0}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Windows\{4EE2DCD1-ED42-4b01-8F41-FFB1A93231F5}.exe
          C:\Windows\{4EE2DCD1-ED42-4b01-8F41-FFB1A93231F5}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Windows\{16454AE5-64A4-414b-B25E-9F69DDC30E53}.exe
            C:\Windows\{16454AE5-64A4-414b-B25E-9F69DDC30E53}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\{D911E2CD-76B5-4797-BFA3-763CC19469F5}.exe
              C:\Windows\{D911E2CD-76B5-4797-BFA3-763CC19469F5}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1456
              • C:\Windows\{044906D5-68B3-4a00-B0BE-E18B6CDDDCC6}.exe
                C:\Windows\{044906D5-68B3-4a00-B0BE-E18B6CDDDCC6}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2928
                • C:\Windows\{A911E31D-30B0-478d-B284-1C229E6C9709}.exe
                  C:\Windows\{A911E31D-30B0-478d-B284-1C229E6C9709}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2532
                  • C:\Windows\{0E3AFD1A-1450-47b3-B4BA-656F2B9F0943}.exe
                    C:\Windows\{0E3AFD1A-1450-47b3-B4BA-656F2B9F0943}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:756
                    • C:\Windows\{E021A8F5-1677-447d-A951-C694CF895C85}.exe
                      C:\Windows\{E021A8F5-1677-447d-A951-C694CF895C85}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2428
                      • C:\Windows\{39C249D6-07D6-425a-9EAE-31F7CC49D52B}.exe
                        C:\Windows\{39C249D6-07D6-425a-9EAE-31F7CC49D52B}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1736
                        • C:\Windows\{944C3F71-DFCB-42b8-B105-8E9D24F56CA0}.exe
                          C:\Windows\{944C3F71-DFCB-42b8-B105-8E9D24F56CA0}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2380
                          • C:\Windows\{06C941B7-037C-4f0b-9543-C6F106E402C3}.exe
                            C:\Windows\{06C941B7-037C-4f0b-9543-C6F106E402C3}.exe
                            13⤵
                              PID:2440
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{944C3~1.EXE > nul
                              13⤵
                                PID:2456
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{39C24~1.EXE > nul
                              12⤵
                                PID:2372
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{E021A~1.EXE > nul
                              11⤵
                                PID:2352
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{0E3AF~1.EXE > nul
                              10⤵
                                PID:944
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{A911E~1.EXE > nul
                              9⤵
                                PID:2604
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{04490~1.EXE > nul
                              8⤵
                                PID:752
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D911E~1.EXE > nul
                              7⤵
                                PID:2940
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{16454~1.EXE > nul
                              6⤵
                                PID:368
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{4EE2D~1.EXE > nul
                              5⤵
                                PID:532
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{4FFDA~1.EXE > nul
                              4⤵
                                PID:2620
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{5587A~1.EXE > nul
                              3⤵
                                PID:2884
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                              2⤵
                              • Deletes itself
                              PID:2400

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{044906D5-68B3-4a00-B0BE-E18B6CDDDCC6}.exe

                            Filesize

                            372KB

                            MD5

                            4c592c1aae9c6684c3f991f5f71e4a46

                            SHA1

                            c7cd42479459dde1d22ae99054db1ba83914cde9

                            SHA256

                            275b7a366cc67f44895778d9cec393efcc5a0828d81bc3de86857633f529a73c

                            SHA512

                            c3df57271a1e3f3bdf8e7fe96caaf144f99cefc8e72f7cde3717d88e8148c14897529654e7a98f5c8a122467099750ec72431ff33020b3267963d6327e32b67e

                          • C:\Windows\{0E3AFD1A-1450-47b3-B4BA-656F2B9F0943}.exe

                            Filesize

                            372KB

                            MD5

                            df364d373294227c8344fe1d2554f000

                            SHA1

                            a1c68d28450f0e09ff359f1dd42207ef72d673b5

                            SHA256

                            f01aab0ffb5decc7393c0b05e72338a63c25843a401fd8dab4d1d04566418f8b

                            SHA512

                            03f562d962b96fdb524aa527e24bfef5049da0ac9f2470b1f8bf6dacecd43e2f9ace02069c96f4f6b0c0046a0fb7eabeef05d94f30f10fde986c21196aef9782

                          • C:\Windows\{16454AE5-64A4-414b-B25E-9F69DDC30E53}.exe

                            Filesize

                            372KB

                            MD5

                            83821a3a912d78e4aba588aaf791528c

                            SHA1

                            37e4e7f21a5d54b00e4a3e8edc97763db169f825

                            SHA256

                            dc0f65564e20d2f748ac67ffdd397f99c56be6b53618869cb06f7a306587f3d8

                            SHA512

                            dfc9b4ceca27e39704662a4eeff21685e0c228a0dbc817ed0271deeb9e795a0536b0a88773d144d18c7d527e01bd636eed568643b1de6384573767c76834f668

                          • C:\Windows\{39C249D6-07D6-425a-9EAE-31F7CC49D52B}.exe

                            Filesize

                            372KB

                            MD5

                            89bdccdeba2b90f4b71f8cb9786e344d

                            SHA1

                            95b929676ebf934e7d33fa904c1d20ee3021c59c

                            SHA256

                            adc87361fe99242e9f21dff8f816b554abebe248df16a86faf287c21226a0687

                            SHA512

                            2ada20cb5cdc550ddbf6035c10859982790b069d2776fec861e3c082962bf58e10f2b3fa38bc42c42d4ca9a00fa02ed7215c93b1d06f7a31f8a83f78bb094a3e

                          • C:\Windows\{4EE2DCD1-ED42-4b01-8F41-FFB1A93231F5}.exe

                            Filesize

                            372KB

                            MD5

                            dddb08f36b94f9296c3d6fc2af86f779

                            SHA1

                            9db07c049f73028db9236f30fbe351a7fb957127

                            SHA256

                            f50204c41f16c7c1606ad5249a78b9c0fb6a89d03af41ccc06b13aa899d65252

                            SHA512

                            4fbad07ed9f1cd4de16a42fa4d16ab74aec007a75ed4408fb6187c6252226760eb9da8cb548a4f45db0d010a033b81c6438e9e22e08da2c7a994b5d9ac670bf4

                          • C:\Windows\{4FFDA76B-AC01-448d-B035-5338BF697FE0}.exe

                            Filesize

                            372KB

                            MD5

                            5a3e7defc686dd1db7c48c0aac8cf363

                            SHA1

                            986b40224a40c72d4d4a49128614d3d30dfb3dd3

                            SHA256

                            e43e1ca764ee8d802a6218909a5174442a02fea10490c690a68851dcd92032ff

                            SHA512

                            34214c69bbd487a1bf3a6fdaa9028a758435065f899ceae357c336c1ff8048258e6980fc09ae0cadb54459ffa598f552c04460ec35bb709de1feb8e2eaa03dda

                          • C:\Windows\{5587ADF8-4D36-43d4-A92A-2DCAFA311B0F}.exe

                            Filesize

                            372KB

                            MD5

                            c6c5accf17d28cfd7736bec9f6f0c91d

                            SHA1

                            cc826402dd4c6283211f3aaf09a2b2d31bd805a2

                            SHA256

                            7cc44bfa68d8560b961f4215378b0e205cc58f216b3284b435ee328776dbc325

                            SHA512

                            a21f7886926efdcfe92898d217c0f5d1af39b1a275732c8a21a8c45893919b89544d353844aa47aadc0e2c8a1cf0729f8fdc8fce898ecfb1ca3785ef437ecf45

                          • C:\Windows\{944C3F71-DFCB-42b8-B105-8E9D24F56CA0}.exe

                            Filesize

                            372KB

                            MD5

                            206838677882caafabd179ae185b40e1

                            SHA1

                            5c9124b28dcbe344c40819f8bd1be73a563a9958

                            SHA256

                            3fac6bbb4617b5840fbc132ffa2f839d9068d8be1e407dccd306040294d4b956

                            SHA512

                            2d67dc4e97ab2941b7f566a9272f586d375591d47638671a188906693df449d4aa6169b0b021c101869b0ad089792ad370e82bf2d44618f34cdb6521d5a6eaf1

                          • C:\Windows\{A911E31D-30B0-478d-B284-1C229E6C9709}.exe

                            Filesize

                            372KB

                            MD5

                            e9a2a1c669c2a8921a3d8e536444a288

                            SHA1

                            849ccbac389ac237e7a0c516b2b0873844aa068b

                            SHA256

                            ad430bf0547edf5f7bc5496ab55d95d6cc17a5e3f8f22e9b1ae31a022e926b49

                            SHA512

                            6e56975febed26bc1fa3605a90e1c7979b2e5abccdb2a93aa628eae6db7faf7f4471eed04170e65356eb569a8078b392836d4c6c3074155001db93b25ab87258

                          • C:\Windows\{D911E2CD-76B5-4797-BFA3-763CC19469F5}.exe

                            Filesize

                            372KB

                            MD5

                            567874967129774249251dbc9b10fcb7

                            SHA1

                            3c817586a01672723ca58890cc3a1e6a7680f17c

                            SHA256

                            c4d260fbf9922bd4cc1a726e7204eb9e8c7fd289d59d9c205216258a795c7fff

                            SHA512

                            a37f2479e8ab62db69ff7cdb79c46a1eaf40e9b7beff3566985835aee261e99a949d409456873e0bc45a464e264264ec7ace66c87b0791ac995e9e386c3b4907

                          • C:\Windows\{E021A8F5-1677-447d-A951-C694CF895C85}.exe

                            Filesize

                            372KB

                            MD5

                            b9903a26d0e887337ffc002a40bb5428

                            SHA1

                            5fcdcc2adc06935b6aaeb57f4359391a4e72df0f

                            SHA256

                            56847bb9627e582bef2ef0012f4441fba7a853f7608633b0eb25d6e91d110886

                            SHA512

                            58f80bc076019cc9c5c2a4399408915066090d6596f7a02845524c521613fe3b813c245a104bc15164aa9368f2fefd1f706fbf9d7000cd3b7ac556d1f6c01225