Analysis

  • max time kernel
    155s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 11:33

General

  • Target

    2024-01-27_7a74af8273ff547010a7a1ac14c05e45_goldeneye.exe

  • Size

    168KB

  • MD5

    7a74af8273ff547010a7a1ac14c05e45

  • SHA1

    36f26deca1ca2092f8567c0cd75b40a84c57179b

  • SHA256

    a40060d3bcc43af3123b2b90f4d1e775190f3df626b866411ccadef5a0a9f5e6

  • SHA512

    1b3eade4501ddca0f9ccf93391a1a9039cd3537d9eacd8a3f14895b3fcc2c2c9c535b4b63aca5e74f2c1442e1c3adf625d9e34326ad710fd6e6aa7b4cc020549

  • SSDEEP

    1536:1EGh0oHlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oHlqOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_7a74af8273ff547010a7a1ac14c05e45_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_7a74af8273ff547010a7a1ac14c05e45_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\{474EF86F-7221-4042-822B-EF9446E7003E}.exe
      C:\Windows\{474EF86F-7221-4042-822B-EF9446E7003E}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\{4A02F349-A640-4bed-B2FF-6D7D403EF2C5}.exe
        C:\Windows\{4A02F349-A640-4bed-B2FF-6D7D403EF2C5}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\{F45DCC7D-E003-495f-B06A-173A320CF8D0}.exe
          C:\Windows\{F45DCC7D-E003-495f-B06A-173A320CF8D0}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4384
          • C:\Windows\{3115A2F8-12DF-46e0-A8EA-9E4026874895}.exe
            C:\Windows\{3115A2F8-12DF-46e0-A8EA-9E4026874895}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3160
            • C:\Windows\{B8E7C5CE-4563-4366-9FE6-CF963BC85BF6}.exe
              C:\Windows\{B8E7C5CE-4563-4366-9FE6-CF963BC85BF6}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\Windows\{E732AC3E-405A-4271-829F-190D6837D035}.exe
                C:\Windows\{E732AC3E-405A-4271-829F-190D6837D035}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4332
                • C:\Windows\{AD26297B-9CCE-40c6-B690-D6189440560E}.exe
                  C:\Windows\{AD26297B-9CCE-40c6-B690-D6189440560E}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4268
                  • C:\Windows\{524B982D-6BCD-4ff4-A615-0E0A5823E7BF}.exe
                    C:\Windows\{524B982D-6BCD-4ff4-A615-0E0A5823E7BF}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4748
                    • C:\Windows\{FD3750F5-021A-4cae-9F29-FA129EFCBFB9}.exe
                      C:\Windows\{FD3750F5-021A-4cae-9F29-FA129EFCBFB9}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3368
                      • C:\Windows\{03BBF717-B84D-42ef-B3C3-A1B5D7CED47D}.exe
                        C:\Windows\{03BBF717-B84D-42ef-B3C3-A1B5D7CED47D}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4356
                        • C:\Windows\{201E6EF5-1273-4652-85FC-A4F926F0DC5D}.exe
                          C:\Windows\{201E6EF5-1273-4652-85FC-A4F926F0DC5D}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:4976
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{03BBF~1.EXE > nul
                          12⤵
                            PID:2784
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FD375~1.EXE > nul
                          11⤵
                            PID:4212
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{524B9~1.EXE > nul
                          10⤵
                            PID:2388
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AD262~1.EXE > nul
                          9⤵
                            PID:1816
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E732A~1.EXE > nul
                          8⤵
                            PID:4020
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B8E7C~1.EXE > nul
                          7⤵
                            PID:2592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3115A~1.EXE > nul
                          6⤵
                            PID:3620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F45DC~1.EXE > nul
                          5⤵
                            PID:4960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4A02F~1.EXE > nul
                          4⤵
                            PID:1320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{474EF~1.EXE > nul
                          3⤵
                            PID:2888
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2092

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{03BBF717-B84D-42ef-B3C3-A1B5D7CED47D}.exe

                          Filesize

                          168KB

                          MD5

                          660cbd9ede67d722efe02b958d5757ab

                          SHA1

                          a94df7208b4dfd783ea7dd98c4a174316e8aea8f

                          SHA256

                          5cdff6328385cfdfe8e26a4db5c5d618ae8b056f9304e406755f9d62692bc56b

                          SHA512

                          303c2f9102133f39490f3da12b6302fd89db1c3dbca7e9db547d86fd2c310bf4efb6c8ea7ec343f3205a198deb2fc415951ac419c13401e59efb982525b7995f

                        • C:\Windows\{201E6EF5-1273-4652-85FC-A4F926F0DC5D}.exe

                          Filesize

                          168KB

                          MD5

                          2f018259e2aa741accae0021d2fc3734

                          SHA1

                          61577893d3a1e490df4b1b86cb8469389c717387

                          SHA256

                          649f17acf9202a88e2a97fd5ec3cb876f452f3910c56bdc36778b32fd21a9ea9

                          SHA512

                          634da54bcf706dcc8fb580792a6bcd568f4a0eef7fd670aca512d7c16f6cbcf0c83eb4a67e5d140e1a28cf5d7000811353d98a43f622351ba1b082f4687df4dd

                        • C:\Windows\{3115A2F8-12DF-46e0-A8EA-9E4026874895}.exe

                          Filesize

                          168KB

                          MD5

                          9351e2465c9c284e891fa1f330d07650

                          SHA1

                          d417f4e60f016d7f877c1f50846a6c7c3616a1d9

                          SHA256

                          66838d0ec1d6b25d4dd7f43cbc17712ed119ff98476cc47f573c8084a73f0f0a

                          SHA512

                          fdc46bee1f96e3887df6c9ad189212331bcbb0dfcba06e045ff0fd65ef6231a213ea64c92db98eb02e279aa7d530d9044bce2ff42d557b691307177038d836c9

                        • C:\Windows\{474EF86F-7221-4042-822B-EF9446E7003E}.exe

                          Filesize

                          168KB

                          MD5

                          2c988b16ce18e18a98bb0c4dd6570359

                          SHA1

                          e330830764207f57428840bc7a5786e85cad3ce3

                          SHA256

                          e3a4cb999b766ed98cf28ea0d5b380b5974df860ec1ab77c5228ddba9aa1f80b

                          SHA512

                          7de48d4fdc771781b9f381255c010e4edf1c0359a6e146db79329f42fff32b29eee93e290798fa22f467b2f2935f5fe5c0897200b5153cb976e1ad874f37a583

                        • C:\Windows\{4A02F349-A640-4bed-B2FF-6D7D403EF2C5}.exe

                          Filesize

                          168KB

                          MD5

                          7cf1038f03cac5ea7ef0b96a8bb7f51e

                          SHA1

                          67d7331b153760a2fa715f37de60c31c068beb42

                          SHA256

                          4e18569bdb22cd4557a40527a6e29c217fc8f4fa04e33ecbf0a5c055c6596509

                          SHA512

                          6be711360b1d69ffc01bb865b3f9477a0903f3ccf40a5f0655c2c962442fad5eb0b46862eecde8fccbd4a3c44075043179d408396f8ed1ff9681fa635f7f8c7c

                        • C:\Windows\{524B982D-6BCD-4ff4-A615-0E0A5823E7BF}.exe

                          Filesize

                          168KB

                          MD5

                          3260e643b68263a057a7988e1c76f798

                          SHA1

                          dc99ff037d041b88a45eb430ed725e66fc9a09ef

                          SHA256

                          521c55373ad8e92a2f0e38892938d6f145287aefb10ae3203d34e6986fc97799

                          SHA512

                          265a89d475e7f299b9856d3767001082fc8384e5a7e469cfd1d6e209275dd05855e9e0f61360e2e2e2f43febd951adac6ec0da077c4a4720a7327ce01bb55751

                        • C:\Windows\{AD26297B-9CCE-40c6-B690-D6189440560E}.exe

                          Filesize

                          168KB

                          MD5

                          eb75ac674da4433704c2e4a6ec8d6b1f

                          SHA1

                          166e120164de9c1f2ee57e12a136e97dd4da4542

                          SHA256

                          9ef2357aed48f734b17ca1dce23073168d59eb4dbd6820f3984d25e79973f1ab

                          SHA512

                          a9817463fd8a45875c6a934458acf9cd8dd44e2f1f5b0a11b467bc5c3688fd4ad448e9a67c660bdecc62a39447a06c86af660c7175c87a48f09146d28328ddbe

                        • C:\Windows\{B8E7C5CE-4563-4366-9FE6-CF963BC85BF6}.exe

                          Filesize

                          168KB

                          MD5

                          47d6f8e34d5a89cc27a58e6866c4acf1

                          SHA1

                          aa211739697c986374b42c37c73a93dd9d16044a

                          SHA256

                          0fa4440e7903d2787a7ea049eeaafaba750ef895e4461c2148bebebd6d5317bc

                          SHA512

                          6eea6cec1df97f63c0a1a0f484e6d2bdc05f0b56b63fa524fa42ab1f4bb0566764932af672423c08e602840f7e06f03c27b8c60af7ee4904a51567f4b02e8c49

                        • C:\Windows\{E732AC3E-405A-4271-829F-190D6837D035}.exe

                          Filesize

                          168KB

                          MD5

                          99221dc08633c3e5060fdb312c3cb8cf

                          SHA1

                          d14444023c589096227c1197381fcc8e4e6ed991

                          SHA256

                          08d002c60d441108fbb50716fb00f53bab9efa404e15e8f6c7803648bb7e67e1

                          SHA512

                          c8db2420d4aca8649faa0a11d99a74fc7994170986d26743ef51befda0507f151c79cc56036b43a86a8733350a6aeff3f36f715bd411d8f777ac0d6f7cb60dd5

                        • C:\Windows\{F45DCC7D-E003-495f-B06A-173A320CF8D0}.exe

                          Filesize

                          168KB

                          MD5

                          691c36a6d78fedd5ea5713b060f75d83

                          SHA1

                          ae1df8cffee4653c8b070d55db693ae1c4a2a9d6

                          SHA256

                          e14486a017c7a2dec8f3c46b866e42dccab5240741b54b239f2b4e4ca506049f

                          SHA512

                          9e001252a434c8085b81aee8b241c2a795b93e0c4e23edd0eac9abe43793cde54f359b11d2c7427c90bf5ef0f627f167eeb199cd9f85008dca05c29349d8c362

                        • C:\Windows\{FD3750F5-021A-4cae-9F29-FA129EFCBFB9}.exe

                          Filesize

                          168KB

                          MD5

                          1d207cc6aeec8b0bb787efa06e82b81e

                          SHA1

                          a4edc3e28b22a061811c47efd9f10413a6916e27

                          SHA256

                          d2b3b19e618d180ac7c83a9ce04379f97e3f1632b0be8c3eb9083705968b627c

                          SHA512

                          1b0b78e502ea1371e566244b3f50487a04cb34a08c448f08d95cc286099247a2f37efec34f8c564c9e6acf670be30baba51ee590d5c35c4cf4ce7bd8e9254372