Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 08:24

General

  • Target

    2024-01-27_1bb0cfc62c12e69b9da10f48d3a286cf_goldeneye.exe

  • Size

    380KB

  • MD5

    1bb0cfc62c12e69b9da10f48d3a286cf

  • SHA1

    6135afda42af7d887441542b981c6ba0e7f4397d

  • SHA256

    523d43cee78144d29e42d9952143cc0aa51efa38cee988abf930a0f25c03518c

  • SHA512

    986d6a0c95b7b9264d1f172869915856f91990888e1529dea9279a55a97f71b14baaacc431e2277bf204e01455bce899210a3807cae050d276bbad4da62c9d6f

  • SSDEEP

    3072:mEGh0oBlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEG7l7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 14 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_1bb0cfc62c12e69b9da10f48d3a286cf_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_1bb0cfc62c12e69b9da10f48d3a286cf_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3348
    • C:\Windows\{D059954E-EB29-4db2-A49F-281B192A387C}.exe
      C:\Windows\{D059954E-EB29-4db2-A49F-281B192A387C}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\{6F14CAB4-BF2A-446b-A50A-F6EFF3D62886}.exe
        C:\Windows\{6F14CAB4-BF2A-446b-A50A-F6EFF3D62886}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\{FA2280F8-1FF6-493c-B844-B7DE364786FD}.exe
          C:\Windows\{FA2280F8-1FF6-493c-B844-B7DE364786FD}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4332
          • C:\Windows\{F067BC46-A887-465e-B09B-E0908E0F6BF1}.exe
            C:\Windows\{F067BC46-A887-465e-B09B-E0908E0F6BF1}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4856
            • C:\Windows\{ED92D35C-CF99-43e1-85FC-1B9D70EDCA87}.exe
              C:\Windows\{ED92D35C-CF99-43e1-85FC-1B9D70EDCA87}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4428
              • C:\Windows\{1089B671-208B-471e-9487-EA7FDD321E70}.exe
                C:\Windows\{1089B671-208B-471e-9487-EA7FDD321E70}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4652
                • C:\Windows\{E336206F-F64D-4d12-9CCF-C1D9EEC7C7D7}.exe
                  C:\Windows\{E336206F-F64D-4d12-9CCF-C1D9EEC7C7D7}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4996
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{E3362~1.EXE > nul
                    9⤵
                      PID:3552
                    • C:\Windows\{CDB19558-C03C-4a0c-92F5-E73619F6DF6C}.exe
                      C:\Windows\{CDB19558-C03C-4a0c-92F5-E73619F6DF6C}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1032
                      • C:\Windows\{58229C5A-4197-4e79-9ED6-2509E016B573}.exe
                        C:\Windows\{58229C5A-4197-4e79-9ED6-2509E016B573}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1848
                        • C:\Windows\{8B8FA20B-3587-450b-949C-79C8A4B1A502}.exe
                          C:\Windows\{8B8FA20B-3587-450b-949C-79C8A4B1A502}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2848
                          • C:\Windows\{F74E049E-F44F-4dcf-82A0-BAC95E22E449}.exe
                            C:\Windows\{F74E049E-F44F-4dcf-82A0-BAC95E22E449}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1120
                            • C:\Windows\{F661B280-048D-43aa-A735-0FD241BBF025}.exe
                              C:\Windows\{F661B280-048D-43aa-A735-0FD241BBF025}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:372
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{F74E0~1.EXE > nul
                              13⤵
                                PID:3008
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{8B8FA~1.EXE > nul
                              12⤵
                                PID:1064
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{58229~1.EXE > nul
                              11⤵
                                PID:4976
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{CDB19~1.EXE > nul
                              10⤵
                                PID:2508
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1089B~1.EXE > nul
                            8⤵
                              PID:360
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{ED92D~1.EXE > nul
                            7⤵
                              PID:544
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F067B~1.EXE > nul
                            6⤵
                              PID:4688
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FA228~1.EXE > nul
                            5⤵
                              PID:3436
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6F14C~1.EXE > nul
                            4⤵
                              PID:2476
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D0599~1.EXE > nul
                            3⤵
                              PID:3076
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2728

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{1089B671-208B-471e-9487-EA7FDD321E70}.exe

                            Filesize

                            380KB

                            MD5

                            ee3e88e5681676a763f5e67671b5bbc0

                            SHA1

                            10ed69b450b4ed00812d2727052c7a8f9361da20

                            SHA256

                            a52787603d4152811b94bf687dd0fb039de552d9c99ed63fab68f50da1f6d87b

                            SHA512

                            9ec49a8abebc6614e8ee0b78e89f03098f4c79ec0577daf0073743aef9163580ee21054e6e77258ba66a7c75bb1dbb980dba3c17be62cc3719af6411c7e985df

                          • C:\Windows\{58229C5A-4197-4e79-9ED6-2509E016B573}.exe

                            Filesize

                            380KB

                            MD5

                            b83a85afd1c0adad92e29f6db137b6ce

                            SHA1

                            0a042fd0daefb62d7cddc9312a0fba264bcabbbf

                            SHA256

                            41363cec5cda2a6f8b9f6a7baf5001f9b0853b693d88bebab7150cbbe835a18a

                            SHA512

                            64adec0756750612bcefff2f5c218177d411c0b2907eea2a6f4f33a1e1368c943a0a974f4effd11f5f97634f38a53881cf29ea1e736bf79c41f7d8b91d0fa7f6

                          • C:\Windows\{6F14CAB4-BF2A-446b-A50A-F6EFF3D62886}.exe

                            Filesize

                            380KB

                            MD5

                            25eaf3ec42cf5de646a146c09738d880

                            SHA1

                            765a139086cbbaf8f100b51c4530dfe543993ed3

                            SHA256

                            3765bee9f0b61fc24a686dba06b5cd2383191b8742a1cc21e0bf1003ec25fdb0

                            SHA512

                            778e799e4dc3c297917f519f81b7a6eef1600b0141352312cc8e8ef72e2e39e1536e834613fde41c3ce78e75d8b177269eea22bd71cd5b8b1eaac20b9a7f1d86

                          • C:\Windows\{8B8FA20B-3587-450b-949C-79C8A4B1A502}.exe

                            Filesize

                            380KB

                            MD5

                            42ced2183b2374c7645eeb0dc498e787

                            SHA1

                            a40de4da0e125db6f78fc8c1982db8de119cfea2

                            SHA256

                            48790c2c70d8cea0364fd82fe28f869d34fc320c7019d7e6bee014113a6313b5

                            SHA512

                            457f922b10821f5c7e5a610fa2fe10a0f5cab166d0a983af507dea8c89d984b7dfba9ef1338a1a26c9886f9ea9214072424f48fa799d3b25d2e294629844cab5

                          • C:\Windows\{CDB19558-C03C-4a0c-92F5-E73619F6DF6C}.exe

                            Filesize

                            380KB

                            MD5

                            f0af14f6cee3bd0ec6e3e889c3a5cbdc

                            SHA1

                            c7ec1d253089bfeb3e0ba3e74fe248151ad4c5ab

                            SHA256

                            f52d8549be2f1e8f5cca238bf9b2da75dd8b7fea4329ca0911c6f9f8ee3f7547

                            SHA512

                            1cbb308e16d615752df31515c8c3b99f22f20621e4e6a61c9762db2df67f423d00fc5eecee48aa415b5fed47e39886678068bd9e42a559d035ef22c15dc47177

                          • C:\Windows\{D059954E-EB29-4db2-A49F-281B192A387C}.exe

                            Filesize

                            380KB

                            MD5

                            d3f763511e21605af3ee95af4d8ca71a

                            SHA1

                            704a4e3b8b8af65fe22f1116d0b7b2f86be90316

                            SHA256

                            ba5f648592ab743584264351175131062e9c23135acd6ab5c4c72f1c1ace0440

                            SHA512

                            18370c9b21941e90f818078d63a68dc89d1f6816175d4132cf7aadf0ace836c5722d258b736ea766a1906a12c8ef006d6d3342dd123f25b696ff893e68e4fd03

                          • C:\Windows\{E336206F-F64D-4d12-9CCF-C1D9EEC7C7D7}.exe

                            Filesize

                            380KB

                            MD5

                            26e459ffe230f9794c1157b9082db319

                            SHA1

                            cdc9766f2f173b253296d7b6de057dd6c9fc9d96

                            SHA256

                            e41dac0d4dd97388c187d1add26e8118b9c555f344b2bc761b0e867dc6a5a6b3

                            SHA512

                            0e4e223bdfe93e85308a341feef3f427758042f08ffe7dac6632b7eef8330be28c08f229f25128033e37ce05753d570f3e16c2126f4baed6cfcdd881c4491eb2

                          • C:\Windows\{E336206F-F64D-4d12-9CCF-C1D9EEC7C7D7}.exe

                            Filesize

                            221KB

                            MD5

                            7e8a2bfb4dfed72caed134189c697675

                            SHA1

                            f741a505aa0f6fc40055bfc24e02d45aa1168159

                            SHA256

                            4e1b15ddfe68bd6d6252deeb2a69dec0ad8522596627488d64dba919ed7b76ae

                            SHA512

                            5b77066227e600ac2d4f4c027343a4da8998dcec9576c36d31bcf3d0466735c51f2bae950a212f1af66b31b4a6068831239c3756847ea9f5ce7670935af7a992

                          • C:\Windows\{ED92D35C-CF99-43e1-85FC-1B9D70EDCA87}.exe

                            Filesize

                            169KB

                            MD5

                            5b30df490094aa0091533f8e02f38a4a

                            SHA1

                            a9cd13aad84bca15bf6a613bcbfff89f47667710

                            SHA256

                            299b4b7a4f37a0d639fa6edd0d62b8e109a20ee5b175308ebc80c99675f86a88

                            SHA512

                            285d380252e8d2597438756f4d9b68ad36cc43eef2f7dc41ffe1c54c47115c990acc0167630f180f82ae2b22094f6e425c60f8412a1c2fdba9e3402925f529cb

                          • C:\Windows\{ED92D35C-CF99-43e1-85FC-1B9D70EDCA87}.exe

                            Filesize

                            282KB

                            MD5

                            60d8d58c77ffa095db6c9a74186d7f4d

                            SHA1

                            b52bd00728cb148c6bdea5b76c591cb7c155131a

                            SHA256

                            33aca62df549a78af4c0cec80d4a68152bcbe97644f9f48dd1da73dba7c404d9

                            SHA512

                            9294e5e9ccd3f8bc636f0a8f4a29a0e915c3b64dbe93c8492253c214450eeaa9d2171cc421dd86187a23412a7de938b6b5dd1a4d9a45a681e0ce93c4d850a1dc

                          • C:\Windows\{F067BC46-A887-465e-B09B-E0908E0F6BF1}.exe

                            Filesize

                            380KB

                            MD5

                            250e7f4a9383f515a00c5a02c4c8e03a

                            SHA1

                            e564f0e9078675af0f0ec20a818d14cdf8136645

                            SHA256

                            c06883c7ba21da6d31b65bb19514fd69094bee31aa18ddfe1b6ef31fc5cbfbc3

                            SHA512

                            51769ec2fd291fbc5fdeabc2510e9d37ceb3dfbee50a73ce9fee23aaad5771a1331bdbbec59bb41b81e49ee311ed599d05dd84a12755acb3b2d7909c95ab4523

                          • C:\Windows\{F661B280-048D-43aa-A735-0FD241BBF025}.exe

                            Filesize

                            380KB

                            MD5

                            8e9fac3a15fa3f8083d502901347c2cf

                            SHA1

                            cacf8db126ca73e94b934bb012e9c3c19e0100f6

                            SHA256

                            009036d39d38d56f2a296fd4e6d8e42b989271e56de7936ae1d2ea4cfaada4c3

                            SHA512

                            3b776f36150949160a4b169a820b3e16ab7f53897ea43792294cde837441149fc94fe5aec03bbe6eacf25a2334677de9942c135f804a71adaacdbad5150b9cce

                          • C:\Windows\{F74E049E-F44F-4dcf-82A0-BAC95E22E449}.exe

                            Filesize

                            380KB

                            MD5

                            65fb6d8cffb42076a18c1dfaf7de67dc

                            SHA1

                            d293a4af0998ee8743742c040017010430bdeaaf

                            SHA256

                            bf604b0a79b9a8d54912a7737fc8de67e0833fade69de1d0e3c9e102e61d3542

                            SHA512

                            5184b32edb419553285ab00d2169b268f70e5f90b2ac47ada03b81605c75e2ae87e57fa30ea570b489dff6a589a02e670aed0297435bb1da11a28b0e3d7b50cc

                          • C:\Windows\{FA2280F8-1FF6-493c-B844-B7DE364786FD}.exe

                            Filesize

                            380KB

                            MD5

                            310ec4bb27d6da6a451926de444d30f5

                            SHA1

                            52516022217f0316e02373e19335f5944ada4561

                            SHA256

                            9d84f1cb09fe9c0d312dbb016238c13a1e3f06d06318f218dd8e01400cf69492

                            SHA512

                            dabea48f5ec6ccb2b9c9450165a9e6da86d9bba9c36cfc102c2fcbfb4d45c0b30ab5927cba61ab8c691f504967abdeac74cb233b726a320afa7d49304ed88fa4