Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 04:39

General

  • Target

    2024-01-28_81e223ac0a3a37ca500c6a921ce4dfdb_goldeneye.exe

  • Size

    380KB

  • MD5

    81e223ac0a3a37ca500c6a921ce4dfdb

  • SHA1

    59de425381df3c9149120c021823fb3738a99594

  • SHA256

    ef06f2bd5901bc299a92c99d45f7029d84214b8885a816d502085bcb9fac528e

  • SHA512

    0aca55c373546eff488f8ed50a4f782365d66c2231455813df1bd01c70598afd4ab4d6d5b75eb2fc057e69301b43a6747f88249df59c793b010d80d6c9b6e2c0

  • SSDEEP

    3072:mEGh0o/lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGNl7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_81e223ac0a3a37ca500c6a921ce4dfdb_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_81e223ac0a3a37ca500c6a921ce4dfdb_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\{E95A8369-9597-4803-814A-65CE4415982C}.exe
      C:\Windows\{E95A8369-9597-4803-814A-65CE4415982C}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\{55355D07-A10E-4fe0-A925-33588815B4A5}.exe
        C:\Windows\{55355D07-A10E-4fe0-A925-33588815B4A5}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\{96D6AF31-FF24-4cfd-8B4F-3084BC2834C1}.exe
          C:\Windows\{96D6AF31-FF24-4cfd-8B4F-3084BC2834C1}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\{1F3C89B5-8639-4d55-BC65-36C0439B1CF5}.exe
            C:\Windows\{1F3C89B5-8639-4d55-BC65-36C0439B1CF5}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{1F3C8~1.EXE > nul
              6⤵
                PID:2892
              • C:\Windows\{18893826-AD92-42da-A263-6D24EC4420B0}.exe
                C:\Windows\{18893826-AD92-42da-A263-6D24EC4420B0}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\{B1DD571C-CA48-4473-A378-B8D5B95C30DC}.exe
                  C:\Windows\{B1DD571C-CA48-4473-A378-B8D5B95C30DC}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2432
                  • C:\Windows\{B804D797-F135-4589-B08A-317C795D8EC7}.exe
                    C:\Windows\{B804D797-F135-4589-B08A-317C795D8EC7}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1880
                    • C:\Windows\{FCBA692D-EBF0-4162-9E81-3660E484638A}.exe
                      C:\Windows\{FCBA692D-EBF0-4162-9E81-3660E484638A}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2228
                      • C:\Windows\{297BE74F-CCE2-45fd-939D-3C958A419DF7}.exe
                        C:\Windows\{297BE74F-CCE2-45fd-939D-3C958A419DF7}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1560
                        • C:\Windows\{A7BE24BC-A06E-43b6-88B4-CCB7F4DBD208}.exe
                          C:\Windows\{A7BE24BC-A06E-43b6-88B4-CCB7F4DBD208}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2948
                          • C:\Windows\{440B4956-EC39-4e51-A66D-72FDFB9D63D2}.exe
                            C:\Windows\{440B4956-EC39-4e51-A66D-72FDFB9D63D2}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2084
                            • C:\Windows\{04C7E20B-0CCE-43fa-B666-48F538B8CD72}.exe
                              C:\Windows\{04C7E20B-0CCE-43fa-B666-48F538B8CD72}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:3056
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{440B4~1.EXE > nul
                              13⤵
                                PID:1044
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{A7BE2~1.EXE > nul
                              12⤵
                                PID:1964
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{297BE~1.EXE > nul
                              11⤵
                                PID:2092
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{FCBA6~1.EXE > nul
                              10⤵
                                PID:2400
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B804D~1.EXE > nul
                              9⤵
                                PID:1684
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B1DD5~1.EXE > nul
                              8⤵
                                PID:1872
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{18893~1.EXE > nul
                              7⤵
                                PID:796
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{96D6A~1.EXE > nul
                            5⤵
                              PID:1064
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{55355~1.EXE > nul
                            4⤵
                              PID:1476
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E95A8~1.EXE > nul
                            3⤵
                              PID:2580
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                            • Deletes itself
                            PID:1948

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{04C7E20B-0CCE-43fa-B666-48F538B8CD72}.exe

                          Filesize

                          380KB

                          MD5

                          7c6b5b31bbae9518a7ecc91876bb5508

                          SHA1

                          c0035b969f117ca23f29ce77db173970383c83a5

                          SHA256

                          869060deb5185c60d4f251790b915c7fd6d6050840cb0af7fc01e26386b1a60a

                          SHA512

                          199e8373b5c632250c6098cfbff70ff9a030c14e07100e00038227ee0f8ec33bd234340b678d433e57a04a50d6b7781f7eb9630d5d5365bbbd5f52aaea22deee

                        • C:\Windows\{18893826-AD92-42da-A263-6D24EC4420B0}.exe

                          Filesize

                          380KB

                          MD5

                          a0ad27f729cce1c210b5f5bab8539ad3

                          SHA1

                          419a9a90a194fa4a2d66e33f545c45ec7df998c6

                          SHA256

                          cea0f4bbd29325d832c078b0d3f71cef79381b9b809fb6e220fb74228a43c622

                          SHA512

                          2084ec349faee8a17b59f0c8a7a848026fb2e4834517c320e100e04d7add4c5c740c0734841fe1d341df97eac7bd9dc3499c2a1ae64076c9ceae51522aa78ac1

                        • C:\Windows\{1F3C89B5-8639-4d55-BC65-36C0439B1CF5}.exe

                          Filesize

                          380KB

                          MD5

                          7d794720e8d911f19f30acb3ba08c3e5

                          SHA1

                          5f81747752a2b32d9dcb2642992adff277925a3c

                          SHA256

                          b39642c511ac2db4076ae8afb7b0810a0a23af26e37a404555d89cb4cd4e15e2

                          SHA512

                          5b99032424e03a69cb520636a60b664b043d054d411d63e3dd49df4381ad06d09f08f3b05d41e6a690c3fd1775a9885bb8f828335c997a9f290379cec5687e1e

                        • C:\Windows\{297BE74F-CCE2-45fd-939D-3C958A419DF7}.exe

                          Filesize

                          380KB

                          MD5

                          c31127630f17fe5007761cb4ff175c21

                          SHA1

                          a13bb62c9773d0b5600b2c9873e5916d6350d6b2

                          SHA256

                          871afea5698e0a24b7e2bdd60b8905d4916a4ae397dca36ac1b115aa386fc467

                          SHA512

                          2d4b12fdcd3e2678268988ed82841af664412f4aadeb7cadd396c84014f4b7d7e42da220b8e9ceba8d39f50c04a0ac3bce4e1b5d01137a99c0f9f14885c781d3

                        • C:\Windows\{440B4956-EC39-4e51-A66D-72FDFB9D63D2}.exe

                          Filesize

                          380KB

                          MD5

                          bb1ccf5651220ebeaf2de1f42c3f5166

                          SHA1

                          3135ac70bc2d7c3b17a0dfb13a9577c1ef5b6008

                          SHA256

                          a6ed7f3e0c9462d8da7200ce7d6bdc482a2b054182bedd4f251c16eb1850e5fc

                          SHA512

                          6453fc4ed01acc9e84ede435d6dd3c42488c02e9c8e11e757666cb31af671efe0bb5d0abd305ad07c2482974c6faca69a4203aa99706bf58507ec2c02cd76fa4

                        • C:\Windows\{55355D07-A10E-4fe0-A925-33588815B4A5}.exe

                          Filesize

                          380KB

                          MD5

                          9ad99f45cd7f46e9cbc647cbacdf45d5

                          SHA1

                          9b29c31772fae1f99fca3f262054334cb046d9e9

                          SHA256

                          65aada02ef45d3cc566b034d0f0fdc1e02203583679e7c68521cc8500ad4866a

                          SHA512

                          d1599c464b557dfde902ab0d8d9d5e906af1f687d88edfa5f2f59e069b95ce3f60ef9c56363536a9426a81e00a01faf7ea199e59f930f4fc7aff5387fd3c471c

                        • C:\Windows\{96D6AF31-FF24-4cfd-8B4F-3084BC2834C1}.exe

                          Filesize

                          380KB

                          MD5

                          5cc2dee8118e6d91ad8649cde3abbd01

                          SHA1

                          ca45548bf0d4efe9f1ba2951a9db5a56fe1cc126

                          SHA256

                          2d419674ee83e5079f3517fc87a5cc3066367944c52421268335382d5a11b35e

                          SHA512

                          f1d4b02fbb5fa717b58293b65c4db740eba804644cc812913d1f827ad3282ea2b97c836fcfe531c5259d4c115b65ea8afc1007b4279e1e04fbb8d0389a2bf053

                        • C:\Windows\{A7BE24BC-A06E-43b6-88B4-CCB7F4DBD208}.exe

                          Filesize

                          380KB

                          MD5

                          01b2b218d73a46f574192474282cdaf5

                          SHA1

                          b6e2122d71f4c0b888e454d87de314f2f0945308

                          SHA256

                          60c46d21528e89a3363088b970e49fb00b1b074d55874251a653629bdfd6ec25

                          SHA512

                          c47bba618ffff02e9f1fd1a3ee51d6c865e6f39aff7944cbc60dde0a2ef02b64a5f8c224a5889b5983c1ea1bc654c38b0f1522583a0b3c171909fa108e4d4863

                        • C:\Windows\{B1DD571C-CA48-4473-A378-B8D5B95C30DC}.exe

                          Filesize

                          380KB

                          MD5

                          56fe98c3764052366cd7b3f10451643a

                          SHA1

                          f6d9a030ad7a08a07c58c573b377e4c02137b202

                          SHA256

                          a1774caf84ab1545aa043d6bcd19729a657801e90e038c66deca220e7316f72c

                          SHA512

                          d849de5e1527b99ad2a5e0277d9f2655986bc184342fe452824513ed70bf39a266fa208c8cb3a40d6a0bed5a2f0f13745eb85db33a77df71f3ea5246107c8f70

                        • C:\Windows\{B804D797-F135-4589-B08A-317C795D8EC7}.exe

                          Filesize

                          380KB

                          MD5

                          690a80937185be09e171b6980033d7c2

                          SHA1

                          eb6807099e243b3369d9a4f985e14069555a4174

                          SHA256

                          82015ffe5dd27a2d47b98ba0206006ba5b2529ae433208cc7f2f20452d83541c

                          SHA512

                          d61cdedc8e5ce46d1c89844e0e74c9511a29dc8391ec49106feccdcdde277ffa8ef39c9d6f13332459fa2f9dcf3031a8ad4de43a11bed15ed3473a7fe6586c0b

                        • C:\Windows\{E95A8369-9597-4803-814A-65CE4415982C}.exe

                          Filesize

                          380KB

                          MD5

                          9ba2fbce44d1fa309de016a8da6535f2

                          SHA1

                          1531c4ca11295ae1a404a49f40205a8c3e8558ac

                          SHA256

                          f9ac4c4367a952444595041f6e03e52c4b302cb5d393114b1bd72d01f58489e3

                          SHA512

                          d79fee5db3fb8911ecb55874040324333e497ba931c9df68296e02355c3159630e5bc7a75fd8210a4f40618e57f263f17a697633e55acda5984fc6215e795747

                        • C:\Windows\{FCBA692D-EBF0-4162-9E81-3660E484638A}.exe

                          Filesize

                          380KB

                          MD5

                          04c0a4f8decce2252364bddab2f3da87

                          SHA1

                          11e8ee39b678439c9915aad15b758085e2323e76

                          SHA256

                          5a71a07853d30e135641e405fdfaad8b8dd2aee06a4bf0f7452b4771765a14f4

                          SHA512

                          6e3fc809271deebbe51e47dd7c782b63e180c604cfba8cfa8fb7f4dc5d2bc4308cfaf26f1d04ba336647e4e6e1448891e87939c8786c00c774d6657f8251ee5f