Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 11:37

General

  • Target

    2024-01-28_c1158a0c88fc7470aee2b977e06527fe_goldeneye.exe

  • Size

    180KB

  • MD5

    c1158a0c88fc7470aee2b977e06527fe

  • SHA1

    a69db3a40eaafbb80048d62c0f84f3342c7f15cb

  • SHA256

    0083691c16b5f6e1c36f2494d5f02e351e08ba072da48c2d68e5f9bb8d7a4757

  • SHA512

    e8aad9a06d5484342a2ca1214bcd00ca8633776953ac44ac44b787e77020d6162ddc8b062edab8284ca06ac65136a7a7a4f248215c2448d69ccb1baf1616a8f2

  • SSDEEP

    3072:jEGh0onlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGZl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_c1158a0c88fc7470aee2b977e06527fe_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_c1158a0c88fc7470aee2b977e06527fe_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\{00695CF1-FD33-4000-815C-582B86762F66}.exe
      C:\Windows\{00695CF1-FD33-4000-815C-582B86762F66}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\{10A9D594-8AF9-48ea-8A11-8D80573B1C45}.exe
        C:\Windows\{10A9D594-8AF9-48ea-8A11-8D80573B1C45}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Windows\{9CD4D24F-1770-416a-9BAE-F70C122E4D78}.exe
          C:\Windows\{9CD4D24F-1770-416a-9BAE-F70C122E4D78}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{9CD4D~1.EXE > nul
            5⤵
              PID:2504
            • C:\Windows\{5B4CF3CF-9B24-4bac-A8F4-6C99A5BBC480}.exe
              C:\Windows\{5B4CF3CF-9B24-4bac-A8F4-6C99A5BBC480}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2436
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{5B4CF~1.EXE > nul
                6⤵
                  PID:1588
                • C:\Windows\{627DE3C2-2DF0-4e08-8BA6-C3099CC29067}.exe
                  C:\Windows\{627DE3C2-2DF0-4e08-8BA6-C3099CC29067}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2388
                  • C:\Windows\{93CC7447-5965-45e7-B2B2-7B9AAE8DF3F3}.exe
                    C:\Windows\{93CC7447-5965-45e7-B2B2-7B9AAE8DF3F3}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2176
                    • C:\Windows\{ACC69C72-8A01-4736-ABC8-A05275333E19}.exe
                      C:\Windows\{ACC69C72-8A01-4736-ABC8-A05275333E19}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1436
                      • C:\Windows\{1DFFDD7B-986E-4724-BB3B-A2D04A37A3CA}.exe
                        C:\Windows\{1DFFDD7B-986E-4724-BB3B-A2D04A37A3CA}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1996
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1DFFD~1.EXE > nul
                          10⤵
                            PID:1328
                          • C:\Windows\{B979B5DD-534E-485f-91AD-850D66C6C5E3}.exe
                            C:\Windows\{B979B5DD-534E-485f-91AD-850D66C6C5E3}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2832
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B979B~1.EXE > nul
                              11⤵
                                PID:2280
                              • C:\Windows\{3383913C-A7DE-46b8-BB9B-DCBF99FF262D}.exe
                                C:\Windows\{3383913C-A7DE-46b8-BB9B-DCBF99FF262D}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2304
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{33839~1.EXE > nul
                                  12⤵
                                    PID:612
                                  • C:\Windows\{AE8CAE2E-A53B-4530-852D-2EAE88CE9C78}.exe
                                    C:\Windows\{AE8CAE2E-A53B-4530-852D-2EAE88CE9C78}.exe
                                    12⤵
                                    • Executes dropped EXE
                                    PID:1020
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{ACC69~1.EXE > nul
                              9⤵
                                PID:1664
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{93CC7~1.EXE > nul
                              8⤵
                                PID:1948
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{627DE~1.EXE > nul
                              7⤵
                                PID:1040
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{10A9D~1.EXE > nul
                          4⤵
                            PID:2572
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{00695~1.EXE > nul
                          3⤵
                            PID:2548
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2848

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{00695CF1-FD33-4000-815C-582B86762F66}.exe

                        Filesize

                        180KB

                        MD5

                        89c9dc4f78e72fc2fab7092602250914

                        SHA1

                        15de10a1b2b8a6a497218a1f26b73a025a944ff9

                        SHA256

                        797198411b30310a72c8e396bdd09ea477184a6cb68d0104822ad495ff59bbe9

                        SHA512

                        bd2564cb1627ccfae44980f7c31e5900dc33da5485e46a2888445aaa63c0e4d5dd9aea0b9b8e409cc7d1a4426ef6ac58e851ee0ed4f1b6413ef5eef544609516

                      • C:\Windows\{10A9D594-8AF9-48ea-8A11-8D80573B1C45}.exe

                        Filesize

                        180KB

                        MD5

                        5edc6dcbb337c825485b54e04db5fbe4

                        SHA1

                        df958f62a71a4304a268d52ee836328f16f523c3

                        SHA256

                        7571f692ba07e1171e5cc9db4fc17d6cc7dd6b90fd77ae2b074edf0fac8b029a

                        SHA512

                        c2416153bd356cdc1f34bf0bc4fd93ceec2d1ff4be97d90da1434da7c55e1f77ed1697dd7e22529682eca4c55141a3b9c1aef1758b720390a54e6b53a8aaa77d

                      • C:\Windows\{1DFFDD7B-986E-4724-BB3B-A2D04A37A3CA}.exe

                        Filesize

                        180KB

                        MD5

                        6dc52aa3a4e3ca0fbbdc43a708a005ad

                        SHA1

                        e74626d0e757fc6f7737603033b15ec46d42186f

                        SHA256

                        15890cca768e18a9c90733f7c0c344d7f547628fc8f440c70a9b96ae37ed386e

                        SHA512

                        ad42832d8116a93b3b251c2b73334f8060ed8afc834dd4a63f849a4f600c10dc4766cfee32c1c9b33e8d26a95374dc570130792ea0cdbf09b1bc9b41b6c07e6e

                      • C:\Windows\{3383913C-A7DE-46b8-BB9B-DCBF99FF262D}.exe

                        Filesize

                        180KB

                        MD5

                        b6b4d263d86b77cdcc3281d6452ab0e7

                        SHA1

                        be8b2fc629d093010bf73ee173b3ab327fe4c5d5

                        SHA256

                        ad21400857098c5a20f58c4436c4025f9f886a61c13cde205fd7caee55a180d1

                        SHA512

                        fec63fa96ad560009fed5b8a00cf6ad72528cc8e82e7474d457aa9244eda2873ced5e08148768d552d690aa34a13555598f9fcb95ec39ce58c78b3eb8c38c9fe

                      • C:\Windows\{5B4CF3CF-9B24-4bac-A8F4-6C99A5BBC480}.exe

                        Filesize

                        180KB

                        MD5

                        4a46ca93d427525b4b63f1279facbab6

                        SHA1

                        363f179fdc1d6170871a950352c80e8cb589bdb5

                        SHA256

                        957c53b745e28db1b85fa4859a707131fc2a8ee519ce1ac71d8288d4e2875f6a

                        SHA512

                        9a06894874a548705d3947a3ac3119dcda8a6475a7fb826235d2bbd16d1c0addca8fab608dc1e993eda937afd454245234e30e96f35c104003d93fe4df6f9af8

                      • C:\Windows\{627DE3C2-2DF0-4e08-8BA6-C3099CC29067}.exe

                        Filesize

                        180KB

                        MD5

                        7928e3bc40e264efe507bbd0724acdce

                        SHA1

                        5e45a5a7c496536c0195f8f2ab4a67bf8702de66

                        SHA256

                        ad5a8c342270a9c7492aaca0b299c9e4c75011c9193a641c98df7482d5fb69b0

                        SHA512

                        3d324824d7a004155be8c431772fee8e52a73cdb4907fe160885aea36929cfe095e268a6d78edaeff25ee5e81be96ecdbf9fbc71dd9945e2073c8247b3e5d6b7

                      • C:\Windows\{93CC7447-5965-45e7-B2B2-7B9AAE8DF3F3}.exe

                        Filesize

                        180KB

                        MD5

                        198506d253180044b8ff7b8423890329

                        SHA1

                        8c34cfcbad009e96b290b4a5f97b490e5e3801dc

                        SHA256

                        eed94cc72add0d478a449e1c164fef0df5cd32063aca58498bfa44505620fc4c

                        SHA512

                        85950e750b46e57d431e994951d4d473ccd74a625ca6ca036c6f0b4de3328dc4a83f7563a162a1f42799434566b4018e831040879e95c0e9b25ce87309a6f279

                      • C:\Windows\{9CD4D24F-1770-416a-9BAE-F70C122E4D78}.exe

                        Filesize

                        180KB

                        MD5

                        9d4e228bcd971324f8c3425f2524fc4d

                        SHA1

                        7ef552848cf77f0d693e4e7745ea641b7dd71339

                        SHA256

                        9985f240086d61fd2bfb77a8c3ef4135e9796be5f5659582510e484d9f97ac72

                        SHA512

                        c57ad76f58ec389c3142102a6527c16735a343b0c60c4db240918cd7c13c2ae31bf5c011511dd8222ec61e4ae4c1c9d38c462abc62bc3a6bbae74d1628b3e011

                      • C:\Windows\{ACC69C72-8A01-4736-ABC8-A05275333E19}.exe

                        Filesize

                        180KB

                        MD5

                        128924e1cc760f6db579e56bf9fcebaa

                        SHA1

                        e3e84f81fa47d65b285e413ae9e15fae4bab7152

                        SHA256

                        c3f72f29eb4a09c06c147e0794718f463ff05e85a7201e4ec38c0f4c614ac84a

                        SHA512

                        6d47f5184ae234df37b1c3171023cd266533ffd917da9a563b0761aef9e580f3b62f2e54c0b13ba1628244bdec433e1a07e2036fee3a965e06dd57f2179a6776

                      • C:\Windows\{AE8CAE2E-A53B-4530-852D-2EAE88CE9C78}.exe

                        Filesize

                        180KB

                        MD5

                        247f5ef3d2f5e4d7d0eaf23145f44498

                        SHA1

                        52bf96009dc9d746acbb10d345135b424270bd61

                        SHA256

                        5a817a085de89275c92ae1c06a88fb7b1dab17ee3ef13cb4115e90dff8be8344

                        SHA512

                        b6efa9024f03d892c0df3d0c1c1a77bf177a58bd34ef1ca4bc36da4a76d8509643b93e8ed46f22e5540e67cd22f48cdc60ab1186d8314a31f1ce895522f9dbdb

                      • C:\Windows\{B979B5DD-534E-485f-91AD-850D66C6C5E3}.exe

                        Filesize

                        180KB

                        MD5

                        781a66730a42b622b98348ba329916f5

                        SHA1

                        420de3ddf467491ac969e3e4f85eb2f96b1f05d3

                        SHA256

                        29fd63816d75f673aab89bb2fc0b4d109a8d23c195995806cdb4cd455a7b46e0

                        SHA512

                        0ab4637c7f8d5d12bd095541c5784e9bc1a528f62d0be3608c30eaee1c7b914d82927f11165b8ddd4aacb513ec6bbd4b5415e88400cf74efb1255f82b10ca871