Analysis

  • max time kernel
    155s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2024 00:33

General

  • Target

    2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe

  • Size

    372KB

  • MD5

    66df83b4656869eefb369c65fabebc92

  • SHA1

    c48f2936456db8e002839828bfbfcf321378a409

  • SHA256

    a60e41b03d814e431bf72b084bf0369775272ba0687086016b20856212fc91d4

  • SHA512

    5570cac2367d35143a3caab225e76c04a91b4f974b07c3cd248401f03d22cd10b75770c7b8eb33980d7ba46b8ae70196a648715e921d455f1976aeaee04f06d3

  • SSDEEP

    3072:CEGh0ommlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEG5l/Oe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe
      C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe
        C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe
          C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe
            C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4960
            • C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe
              C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4676
              • C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe
                C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2140
                • C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe
                  C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1512
                  • C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe
                    C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4228
                    • C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe
                      C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4144
                      • C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe
                        C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3596
                        • C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe
                          C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:3384
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{699DD~1.EXE > nul
                          12⤵
                            PID:4892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2DAB7~1.EXE > nul
                          11⤵
                            PID:3164
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DAA78~1.EXE > nul
                          10⤵
                            PID:4428
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{44D6F~1.EXE > nul
                          9⤵
                            PID:4480
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6124B~1.EXE > nul
                          8⤵
                            PID:1328
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8260C~1.EXE > nul
                          7⤵
                            PID:3320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7C168~1.EXE > nul
                          6⤵
                            PID:3520
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{798F5~1.EXE > nul
                          5⤵
                            PID:5116
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{39A25~1.EXE > nul
                          4⤵
                            PID:1476
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5BC6B~1.EXE > nul
                          3⤵
                            PID:3908
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:1732

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe

                          Filesize

                          372KB

                          MD5

                          0ce898710ba14bfec1eb58c415f40a45

                          SHA1

                          cbb003ffcfd0247f8832eb5f085c63227a2bba5d

                          SHA256

                          44ca6375bf24f1a7f9f8dc5a6993ed51239658ad7c135bf5f3a788a8b6d1f7ef

                          SHA512

                          5f42bdb2ffc09bbdf9a3e8842730965eead65f8923b6d014cef5366409822183811d6ec1f837ebd5a5ee9dfcddd8400ca8efe9f2ef33e3e8fdca8e20427e7551

                        • C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe

                          Filesize

                          372KB

                          MD5

                          b2b5be56df6d34317731565a5d78a68d

                          SHA1

                          c2bfb1c1e26c9fb0b556091a47950fe5aae539a5

                          SHA256

                          3a96543d8bd9ace265655c6809373da6627eb53361d44dd398d6f71cbb1fa66d

                          SHA512

                          ee6b08237174137b72c43cf12ad9601a5b2f04a4850bf9cead3f2ee8833e1cbf3924e82e12bdc1c8937202027fe79887477330dbf2fe4f789565dbb9c4aae17d

                        • C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe

                          Filesize

                          372KB

                          MD5

                          eba808fc2cde011da5b997d85e11a2cc

                          SHA1

                          416c9dedb78818ac609999c0e17563ad51f6c6ad

                          SHA256

                          f3b76294c07b3e5e24951fe559bbbcc6416e9ea860b00ad50ca71975195366a4

                          SHA512

                          e593d9a88d881489da17a2d11cc260c314f9c201a3f6b6f28f8264b939edf385e608b30d3648ee5e6a7f8fc1ed07c600b47158cd4ac7643f0e2cbe3beb8be482

                        • C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe

                          Filesize

                          372KB

                          MD5

                          d6f431c3ed3c15b53bba69840795ed2b

                          SHA1

                          e36e2887549159c75cb64f8cd0ee7fd97612921b

                          SHA256

                          1b644de365ad39766411e9e7d9c28ee2f30cd66dab8f115a0ed84c253fef23a0

                          SHA512

                          5ad9bc4006b82e748bca9a30ca66724d96cff02714b48f1688a40ac89718466352a1b53a0f1940301ee0b2d3e95d264706f6c3a98881c22a25448ceb277b7689

                        • C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe

                          Filesize

                          372KB

                          MD5

                          2c397c294e5e4a2bbcd2ea785a373868

                          SHA1

                          15adadb97a92072065ded96940726d1ea336a4bc

                          SHA256

                          983062767d1caa37c5fd0336fea73eae9ef27e67945b73e4b9b23c3ef8697b95

                          SHA512

                          7d96a2ae3b392d01781346641edc9a222e2f7f7dd582fa37406987d76305b109fee33eaf15419f28367ebe129ab7b6eaf14dd972ed48529394edc196cec623be

                        • C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe

                          Filesize

                          372KB

                          MD5

                          f242e4fc839f0baa897d3c797b8fe32d

                          SHA1

                          c0e18f518ef4d7ab14fcb975cd7f0886aaecab4b

                          SHA256

                          73df5be888419529fa97a80d3c9756074f2fe5670a02bbd4d2d3f5919ec94aa4

                          SHA512

                          b7b3a09cf5993c9f368f050a0e7c6a44415a9c34c4d056b02c387e46e285a373962eabadf972600a6506db60d2f455164eeb38b8ba65951b8e9acd3f0c3b4cb6

                        • C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe

                          Filesize

                          372KB

                          MD5

                          761332db0c7cffdfd87a657d97d0043b

                          SHA1

                          707dda524ee321544c67f52d746e18fc4d0bd901

                          SHA256

                          6149c4feb34dbc802d76d288b1995f39831d979224d3f2bc1c5b78f0d76d49d2

                          SHA512

                          0b858be199c81aa9b5bb00fe35400f555a88b4e199d10f6f6241bd0a643d8d69fe399900f3728e0a6a892ca57edb38edad75155c972c16b0d12eeda9a8949950

                        • C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe

                          Filesize

                          372KB

                          MD5

                          94adaecb43fdb08b395a568c9d5396e7

                          SHA1

                          b73f40ccb9a0670919f79ca54d3e3d6c2d905ab9

                          SHA256

                          02ad9bcfb1015fb7ee3101b49902a53cc88c1a65e4f016623915a9b474df18ad

                          SHA512

                          f836761cad65b1c5dd15c9b41f2c6d2ff6e9da4bc665001c8223dd535207d3b9cf5118a224b8cbe9a793f503161cac62ff17e0648822690c64b7e00608061f7d

                        • C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe

                          Filesize

                          372KB

                          MD5

                          92c1c05491f57d2660fa9973d05377ed

                          SHA1

                          918be27dfb3166cc42c9cc4d2ad744112467d34a

                          SHA256

                          035a8aa3167586e8a882c5286ed92c0fd64540c976972f8099c175868527bb95

                          SHA512

                          54857fb836c9ceff22bdee77cb3a69ea90cfe894a9b1ed71e5b1edb2532174695a58d30f1a617a5667c3fd836f982c57be5ccd4d278ac42cdbab9090131d791e

                        • C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe

                          Filesize

                          372KB

                          MD5

                          6c3b41cd9cc4a4852e58686ef9863ffb

                          SHA1

                          d2bcd7a708da08a1be74ece04cd9e08515c89459

                          SHA256

                          cabab38056b8ab9db5c14f166eca734955d3daac09b5f1eb67f5a60c8760c28c

                          SHA512

                          497348e46d4cd2347f8690d5485942b466c667da4b87b45bad89d70b85596c89d8003a908d270438ef5408af3a15b04ab5d147cb4be33382574c604f113c6292

                        • C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe

                          Filesize

                          372KB

                          MD5

                          c37963bee46dd9108102650ce167c8c6

                          SHA1

                          d05c0ba4aa701cabf8cdb0447176e56f40d4ad47

                          SHA256

                          b9455f1c963c56e830d29a2e1386ad332b9f18767d2451304c2bdcf8e0520dc2

                          SHA512

                          d6ba681fb3055c4ea37b01bd32d2edff7f68a8a558b66e714c48ca8379f66fec3ed32e6a98d9ee6da5d2d854f2ef581a26ef817a4b80754a83f6f3d33f522187