Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 16:48

General

  • Target

    2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe

  • Size

    372KB

  • MD5

    e2c1bfeed2de4891b22b3edc77f5085f

  • SHA1

    b2e677ddb01ba5ea6f66b3bb320bff12616b3955

  • SHA256

    7157d6199bdf099598ebd24ad7465171c3e4fd68e08b6d7e99ab5c56cd8c62b1

  • SHA512

    4c87b44b12e244fbfb5458519dd5e8020b7b58181c4ee4ecb26c03e65f042c26059c9bcae86d10bdb4e5e024236a2496492a9721ea9460137c96f12ab0b82877

  • SSDEEP

    3072:CEGh0ormlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGcl/Oe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_e2c1bfeed2de4891b22b3edc77f5085f_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe
      C:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{E186E~1.EXE > nul
        3⤵
          PID:2896
        • C:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe
          C:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{A0A48~1.EXE > nul
            4⤵
              PID:2788
            • C:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe
              C:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2428
              • C:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe
                C:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1836
                • C:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe
                  C:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2916
                  • C:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe
                    C:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1936
                    • C:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe
                      C:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1804
                      • C:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe
                        C:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1400
                        • C:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe
                          C:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1520
                          • C:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe
                            C:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2956
                            • C:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exe
                              C:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exe
                              12⤵
                              • Executes dropped EXE
                              PID:576
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{F7B41~1.EXE > nul
                              12⤵
                                PID:2456
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{068A7~1.EXE > nul
                              11⤵
                                PID:1156
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{62B3B~1.EXE > nul
                              10⤵
                                PID:2408
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{70E28~1.EXE > nul
                              9⤵
                                PID:760
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{7BF9B~1.EXE > nul
                              8⤵
                                PID:2196
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{AD259~1.EXE > nul
                              7⤵
                                PID:1248
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{87FBF~1.EXE > nul
                              6⤵
                                PID:1560
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{B5642~1.EXE > nul
                              5⤵
                                PID:1848
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2764

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{068A7F74-35D2-481d-AC83-A01073F6D2B1}.exe

                        Filesize

                        372KB

                        MD5

                        86646999090fc3d75e137c061d6bda5c

                        SHA1

                        e581581b57d6573c056e0fdf9189d9af3ff25efb

                        SHA256

                        eac5329917b6d0634eb10c05f6ed24f40d50d3f8cea6ae3e30a1169d03e15de0

                        SHA512

                        20eab8c2d3e18b454659c6e242e2b32d3b9f93e576551ff848de645b92bba2301e57085a1941919be4e00e437222f2b7dcda2f4d1e4c1377816ffd41d9e1d1b1

                      • C:\Windows\{127576DE-7193-4587-A3CE-B434E86148A3}.exe

                        Filesize

                        372KB

                        MD5

                        a09ce602f8c98388801cdc3330c1ab16

                        SHA1

                        4aa666d00bb5ec35261132f0a3b91ad65bdd22ba

                        SHA256

                        f038bf3a32d9b2bd5734e2b26169b39c5b9759d516f616e9955173a750b9be8b

                        SHA512

                        04b7c6a01dd9433d657ce401f266c08c7b3d94ba72f00cdf4e79f97340a3a710553f97eb3fd0a25472aa7f0c2f44f5775ef8f823cb2c8a93a0b3fcce0e781960

                      • C:\Windows\{62B3B8EE-CB1A-4bb2-8863-EF00F74D7655}.exe

                        Filesize

                        372KB

                        MD5

                        137c4125dff942d02d4d4f8c65a4a39a

                        SHA1

                        e7be65d3589822922236e617aecc1f46d7cb0725

                        SHA256

                        279ae82a5c65ff0e8a917fbea1ee6a124f6e38a3dc8dd8dd5b6a8514b41274ea

                        SHA512

                        40b834569006da605e04eeca0c7dfde6a1cd96383f4e6d09aedec431d9fd0e30b88b80931e3ffaf6621768a9eba36ced576dc69c1f1c64a4f2aeaeafb8c0ad15

                      • C:\Windows\{70E285D9-408F-487c-9DCD-19DC4B7F8309}.exe

                        Filesize

                        372KB

                        MD5

                        b382ece097d4bab279c1e0b87c25b9ca

                        SHA1

                        e5a36e0f706e7dfe8f094c80097c3fc9269c2e7c

                        SHA256

                        55a4db7d7f85f36a553cceb3cbd276647ca11375ea618a07c1fcaec0d619c1d9

                        SHA512

                        18dbb32e580070854b2d702c9ec626f66a0ad968bcf5c40a01fecdf780a9497aceeddbc402e5022bb26dede3aa4b042ee70beac8c09288f007eba93514d9e919

                      • C:\Windows\{7BF9B48D-B8D6-40e3-8A3D-3BECE10FB975}.exe

                        Filesize

                        372KB

                        MD5

                        a857fa64cdec0980946df9035d02c99b

                        SHA1

                        e3feadf1e217816c5724a395e92599b2bf119ef0

                        SHA256

                        337443da41aa7812283b6a1e2f6404fd831104f5aa3a0126fc31e0235c8c9e16

                        SHA512

                        f36b155133fbe744d324af692d1be4fff2c1e166ba9fc6a05cba4c59b33913e8b773ecbc687228e747fd40e8e17337401fdb7d5b293fbf2bdf5b3a890c1bb6b8

                      • C:\Windows\{87FBF5CB-C1C6-40b9-9A6B-F499F1C1D0D3}.exe

                        Filesize

                        372KB

                        MD5

                        f17a3a11c82dac948f2caf56b99de125

                        SHA1

                        e747a18d3597e86798330c13f9cb61da69228f55

                        SHA256

                        300e2b885b300672bc62268f580c846c00f7922095cc202d3b4da3cdd04bc7f4

                        SHA512

                        8f109fd471dcf6db3771a59db12c26ce401946b30acd5d3415b931cf796da53eaac4ab57b59c038fdf42ca178e73fb2b37ad3858e828a72b17a17d9753d37568

                      • C:\Windows\{A0A480C2-F99F-4223-88EB-61B51477A1B7}.exe

                        Filesize

                        372KB

                        MD5

                        1e22a951e7582295a74253cedb371422

                        SHA1

                        d3ed04a10f2d3c85562bfefe5d43e7bb15ec28d6

                        SHA256

                        aa321676b908f36dc3ed207f9d7aa3884cb742ea52da477b8dcb55f5e0588385

                        SHA512

                        f6f7742f18249951aae5fe3b75ad758fb14fd4368e705f06ea344d4933a94a9d7e852445e56545ea6d5f6b4fb1a16c76b6169f699ae33f4717317a3dfce7394a

                      • C:\Windows\{AD25999F-65ED-488f-8B40-70EAE917ED32}.exe

                        Filesize

                        372KB

                        MD5

                        470f0654e9307b79fd53640dae30b6a9

                        SHA1

                        5511f0714e6a912dcfeff85afcc40f39af46e22a

                        SHA256

                        2c387bc9de4b3687880f56e9bd00a74b259fe5b3c6609b6abcad79a3d6bc84eb

                        SHA512

                        ea41a2ca3436503ff02c5dae3be968e05cbd55a5cab1c254fe370ebfe49d2371afee724e328327897e897f50f7b64a37e7678ccd47b9053c7680044a6777cb66

                      • C:\Windows\{B5642B8F-A1E2-43a4-823E-1DF8AEF48243}.exe

                        Filesize

                        372KB

                        MD5

                        9a2781fbbcd19a5e36d63d63b6315ada

                        SHA1

                        81d88f3a6ba895b8f32d6d58a62d75267b39d1bf

                        SHA256

                        9c00961b072b6cdf4297a2feae30df110bf4083692325bf3c45aeb43707b8628

                        SHA512

                        05d3fac3d75139e47376391516a1e3bff4f99e12804a45fc62b5e8412dc1aaa18263936eed9cdfc936b02206248dd0181a873c03c3531525068eed5bd8c7abc6

                      • C:\Windows\{E186E9A6-B0B9-4fab-91DA-3731DC9C6EA5}.exe

                        Filesize

                        372KB

                        MD5

                        eae590a1d25f95adb841cf7c98aaa903

                        SHA1

                        a69115b7e78065bc8b4afee70ece1097de48188d

                        SHA256

                        c0bca7ac183fb9aa249087367c60e1aed0cf3205e360d6a8753baaad92b57d2e

                        SHA512

                        71e6d3216bd5f3a056ad5068cc58aa99a9d4d0dceab9f519befd25d77864b7cfe6f812300658e88dce310ed4b494fec28288dc98a7f5ac0a9a2c51145a4db9c9

                      • C:\Windows\{F7B41764-0A44-4b28-9B49-3A09078EE097}.exe

                        Filesize

                        372KB

                        MD5

                        6b9dc614a206ae3de61b125a1d95e770

                        SHA1

                        95708e80171ee1afb6897be2d1267e30024d050a

                        SHA256

                        3eef71a83917851c9e978ee8933d6419d9dc2d7b34897077660b121e194dcfe2

                        SHA512

                        1887b4e007457d20a6585177222dd93296294d603692e0e4569002ee614b7340161ccf13a08f93354091ae73163bbd92a8d0631a9cc13733576c6e0ba0523373