Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 07:29

General

  • Target

    2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe

  • Size

    408KB

  • MD5

    314820ef246082ebce4ff9f674de1a2b

  • SHA1

    dc9e418b7dc4e35e399b119e5eba71c566988713

  • SHA256

    5f19a960f57e36a662008f4ce4f226e250d494382f37a1b89a4dffec38ac86eb

  • SHA512

    893124adafcfc9e3f7eeb8ad129bdebf06163cf92e0f9dd2daaff611fbcc7067fec9ce3f122319992140bc8287496b44a55933c9b6bd608ae7b561d7fdc98e5b

  • SSDEEP

    3072:CEGh0oil3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGEldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-24_314820ef246082ebce4ff9f674de1a2b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe
      C:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe
        C:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe
          C:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe
            C:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2208
            • C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe
              C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe
                C:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1964
                • C:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe
                  C:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2524
                  • C:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe
                    C:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2924
                    • C:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe
                      C:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:784
                      • C:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe
                        C:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2076
                        • C:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe
                          C:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1676
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F8BFD~1.EXE > nul
                          12⤵
                            PID:2448
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{19636~1.EXE > nul
                          11⤵
                            PID:2140
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{93DC4~1.EXE > nul
                          10⤵
                            PID:2904
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D4232~1.EXE > nul
                          9⤵
                            PID:1072
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{64F11~1.EXE > nul
                          8⤵
                            PID:1296
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{03CFC~1.EXE > nul
                          7⤵
                            PID:2936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{ECE73~1.EXE > nul
                          6⤵
                            PID:2640
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B42B3~1.EXE > nul
                          5⤵
                            PID:780
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AA03F~1.EXE > nul
                          4⤵
                            PID:2148
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0FE06~1.EXE > nul
                          3⤵
                            PID:2836
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2780

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe

                              Filesize

                              157KB

                              MD5

                              41c8720f2df8e5fa0675237bf74df4ce

                              SHA1

                              70b4b780f053250473bd37a1264992bb9122ee73

                              SHA256

                              b69e4bd7c4db27c1c056b39cb64972576a60afa8fa07a82cae7a5b2f4cf546c1

                              SHA512

                              9ccb10e911f4a08aea457981cf6dd9070aefd124fc5ee86d8510af5941915b8b890f19739fd00ba993496bd44542b1c1899a93886475138b7ecb71bc51eff1ea

                            • C:\Windows\{03CFCFA0-3EEB-41e9-9729-0884AE031923}.exe

                              Filesize

                              408KB

                              MD5

                              930d7de1a3505891d36b2646fe8c8966

                              SHA1

                              97d1dae283af14d25e2a53a489bf1d3f6b262d33

                              SHA256

                              5b25f68607b00dccf1e801e9b9eac50f00cc7df6c26bd5d41a9d1042b0b30e8a

                              SHA512

                              6c0090afb4f8df348b7395ba4aeaedc2813ba3430cc2d0ef1c5ba9254724e6fc57e04680876ae84f75204b1a14a752f59a9387ffbd8c891364ce2cce73940027

                            • C:\Windows\{0FE06601-EAEF-4897-8795-A909B9B291DE}.exe

                              Filesize

                              408KB

                              MD5

                              03862f7f9a76cb29bf857dd0b6883539

                              SHA1

                              350ea33e6fc53a1490e1e03fab12895e598dd928

                              SHA256

                              a5fff2e522467f0021492e776caa000dfa0cfd919e968f1bc5c92b437e45bff9

                              SHA512

                              9668953dcb1e50be3fe93e31b279636fe4633806cfd1b7a31fb1d8c55c3247a5113b027e4f90347b72e724da75818441a8aabb4287795bfd8a0011908f1d9e98

                            • C:\Windows\{1963611B-72B7-47f8-8942-A3C908D7D666}.exe

                              Filesize

                              408KB

                              MD5

                              8cc3b8bff845cc845a6a7b64f342d5ab

                              SHA1

                              a3351e936262bb6635817724f49b8a0c9f6ef870

                              SHA256

                              65fd42cfc26ebcc91ec0873a1f4c173deb551ab92e8712f54c17d5520a5c7ef8

                              SHA512

                              9a1a239769d6eb045aec784e19a4de35da85c3568b0024bd6f383809652bd68de9f26c21c085297db3b5008bc3fbeabc4bacc205c20f33fe2cf64361e92ae3cd

                            • C:\Windows\{64F11729-7FAC-486a-A3B0-C0286BD07881}.exe

                              Filesize

                              408KB

                              MD5

                              f386ae392db5d36c52399f9909d2c87f

                              SHA1

                              ad584027919b628c2875d1c6f3f8597d8b6c48cd

                              SHA256

                              d851f78f2969145c98d82306174ef7fd285e117a657213eac4f3937881f7019d

                              SHA512

                              5f4f6a040774a7044ba23563688391033913d8fb8806b5806c89bf45fa203c2306923bf919171179f69ba2b5d029229b7dd28f6d98dee1d30a977f153eb08863

                            • C:\Windows\{93DC4B34-C5F4-42ca-8556-6F3E3DFC0865}.exe

                              Filesize

                              408KB

                              MD5

                              c56159b3914cead9e5388b8e09170cd8

                              SHA1

                              90923ba862c94e5aa735b5a5f231a36fc321c650

                              SHA256

                              ea542f3efb84d4c979a84a1b37808db3d0b07a7fdd22fb7127eaa99838dfcf56

                              SHA512

                              a5242b7fc1eaee4404dfb6bb03e4a274426cedf80b50b1354d4b7beffc3b249be94c86adfeaf1e5a5d1b74e226690d3619f857c1c55bfe9225d8a6ca071e5623

                            • C:\Windows\{AA03F710-2AD7-44bf-8351-BB976119A82A}.exe

                              Filesize

                              408KB

                              MD5

                              2bc995213253ef427242ea88a4348ba7

                              SHA1

                              e2ffd72e753fe248b4dfb206d68707390174b4f5

                              SHA256

                              aa2e177e0dc5e0e66c029b4120febc5b2d489821acc566b40ec532f117d438cc

                              SHA512

                              e1e581a31bd4aea9096a7358839b66f4650be92a5dffd8772262ac1fab1510b560735f8970ee45d148f2483ec2f7346d8a69064a4333cbf9da2ceb4e3e5ffc37

                            • C:\Windows\{B3C109DB-3238-4842-AB90-DDC66E01FF8A}.exe

                              Filesize

                              408KB

                              MD5

                              e0b6303ef2b0ea30e2fdbf0e0af85f6d

                              SHA1

                              7f1baa82bf974a04f1ab7c25170e161e0244da5b

                              SHA256

                              5b6f017290760667bf696d29522985f3af08571b11e2b6fe784157ced3b00054

                              SHA512

                              5036673e09ce077638bbeb6572d63780609e363cddafa8d4b20cc2f85f5bae79ee98e01f206850f446cc8f548625df445082785a6def194bc641b685d7d9beb9

                            • C:\Windows\{B42B33CF-D593-48df-869E-193F401EAD9E}.exe

                              Filesize

                              408KB

                              MD5

                              1cb43767fdd72c20a90bb1399f4b8a83

                              SHA1

                              9ab06a154e29e25371a7d1d9b88d3aff6136a314

                              SHA256

                              dfb844d512f1d1ead9cb4c9cbee54ddb284ba7e4c674f7d50965b27e57b85928

                              SHA512

                              c2943d0eb261b14114469a528c5bb34cea02e3b7b3ed2e79fd36bff93d7e12cda7b4e36fdbe87564075e5045be2befd2c9948a211672d3a9b9bbb8b5aa8f91e7

                            • C:\Windows\{D4232E9E-AD5D-4b32-84D2-F91BBCA3703D}.exe

                              Filesize

                              408KB

                              MD5

                              e5c86d2c6a9b120e148c1ee5a9f59c22

                              SHA1

                              498696b1e4c789081a040ae39665937415101ebd

                              SHA256

                              2549d7f921f528770af81484ca8fc21fd8d13db9e631f8dde34787a0fda7d020

                              SHA512

                              0821efaa6fad058742b6e90f27b40514497cce0b9395241e1d8f443decdbd27650a76f116673d96da2bd0e702a575f328f542f5ef61943343e0de7ca37e22b98

                            • C:\Windows\{ECE737E7-A26A-4931-B50E-D970BCE14DEA}.exe

                              Filesize

                              408KB

                              MD5

                              5def4e4d9ef834cc60845384897f0415

                              SHA1

                              144c9e1a8eaab234de0be3f2cccbae692a3b7039

                              SHA256

                              175942e9c7abd2e657939e42c1b3d3ea08628bc095a727160c92ee69ebbe5553

                              SHA512

                              fea237886e20c4df380e2385b11f28dc589b611cc3fe19e74ad6e153006523de0be400c089cbae870fb8773eab5b8f8de53a2412a5401125d3e628d43e0d802d

                            • C:\Windows\{F8BFD90B-191B-4509-9A60-5B30A9C9C61A}.exe

                              Filesize

                              408KB

                              MD5

                              127a798ccd4511b427355c50e7acd703

                              SHA1

                              16cc86639e262fc407bc0e0abb85a5781425835b

                              SHA256

                              903826cb4d1feae36962be00eb7864b4afd8287912ce11dd5d832c5e4c9b4f71

                              SHA512

                              35ad4ab3ac1ba1faa4189740e9614d00b161325d2ebd29da048c2ffd7575174e17096a04ad271dcae22df742e127b86579781a393d85503256eb2d8aadd45c5a