Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 18:53

General

  • Target

    2024-02-01_af5021b6d57bedd6e34a4a3e6c08f1cf_goldeneye.exe

  • Size

    180KB

  • MD5

    af5021b6d57bedd6e34a4a3e6c08f1cf

  • SHA1

    9b89844a0a781c88f3dd5ee6e5b0496d4f0d4e03

  • SHA256

    cefe367ecf5ebc8acecd85ca402b419f361fbc6e61fa21a024c491ae84c7bf39

  • SHA512

    ae0ce7138a203b5aadbe0362f0fd568914f8827be2cec1cb01ef7a65184cce36759d81322455b1b525b97dd28595cfad658991a9b59e892ba48098cfc7936c74

  • SSDEEP

    3072:jEGh0ollfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGTl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_af5021b6d57bedd6e34a4a3e6c08f1cf_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_af5021b6d57bedd6e34a4a3e6c08f1cf_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Windows\{11BBA2F3-E5C6-443d-8E2F-4792EF206297}.exe
      C:\Windows\{11BBA2F3-E5C6-443d-8E2F-4792EF206297}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\{65BAFEDA-71BF-465a-B514-47B8EB055536}.exe
        C:\Windows\{65BAFEDA-71BF-465a-B514-47B8EB055536}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{65BAF~1.EXE > nul
          4⤵
            PID:2056
          • C:\Windows\{D12F4BC1-F4B1-4119-AC8B-1EA105F02046}.exe
            C:\Windows\{D12F4BC1-F4B1-4119-AC8B-1EA105F02046}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\{14E434BC-B76D-4485-A813-69173F61A18A}.exe
              C:\Windows\{14E434BC-B76D-4485-A813-69173F61A18A}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1448
              • C:\Windows\{D16F39BF-EE46-496b-BB8B-8FC2367375DD}.exe
                C:\Windows\{D16F39BF-EE46-496b-BB8B-8FC2367375DD}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4696
                • C:\Windows\{56B7567D-A4F9-4294-8A9D-F05BBCF07220}.exe
                  C:\Windows\{56B7567D-A4F9-4294-8A9D-F05BBCF07220}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4712
                  • C:\Windows\{C4337CE5-4D70-4343-96C7-58ED89924E99}.exe
                    C:\Windows\{C4337CE5-4D70-4343-96C7-58ED89924E99}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3004
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{C4337~1.EXE > nul
                      9⤵
                        PID:3452
                      • C:\Windows\{47C3FAA8-CE21-4e93-B0D3-7A309C440B31}.exe
                        C:\Windows\{47C3FAA8-CE21-4e93-B0D3-7A309C440B31}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1232
                        • C:\Windows\{769EA581-0D6A-4e55-8499-4B205B4B5FB6}.exe
                          C:\Windows\{769EA581-0D6A-4e55-8499-4B205B4B5FB6}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1652
                          • C:\Windows\{24D77668-C9A3-4c95-AFF8-CBF046E7B5DF}.exe
                            C:\Windows\{24D77668-C9A3-4c95-AFF8-CBF046E7B5DF}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:784
                            • C:\Windows\{4E618989-891B-4a7e-9DB8-967F85D90A67}.exe
                              C:\Windows\{4E618989-891B-4a7e-9DB8-967F85D90A67}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4048
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{4E618~1.EXE > nul
                                13⤵
                                  PID:5116
                                • C:\Windows\{A0966E3C-9FB4-4b0c-8C59-6AF5E7B5033F}.exe
                                  C:\Windows\{A0966E3C-9FB4-4b0c-8C59-6AF5E7B5033F}.exe
                                  13⤵
                                  • Executes dropped EXE
                                  PID:4052
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{24D77~1.EXE > nul
                                12⤵
                                  PID:3076
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{769EA~1.EXE > nul
                                11⤵
                                  PID:3412
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{47C3F~1.EXE > nul
                                10⤵
                                  PID:3700
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{56B75~1.EXE > nul
                              8⤵
                                PID:2244
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D16F3~1.EXE > nul
                              7⤵
                                PID:2756
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{14E43~1.EXE > nul
                              6⤵
                                PID:3240
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D12F4~1.EXE > nul
                              5⤵
                                PID:4288
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{11BBA~1.EXE > nul
                            3⤵
                              PID:2152
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:5048

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{11BBA2F3-E5C6-443d-8E2F-4792EF206297}.exe

                            Filesize

                            180KB

                            MD5

                            8b724415f349bae606c3a8aec4f35beb

                            SHA1

                            b48abeb196676d2cd44c37b18fceb675fe901149

                            SHA256

                            4c4ddb7e0b15171e8e2e99d9b89a6366f10585b97d8c6f7f9a57bf25e9745095

                            SHA512

                            2cc4029a8b1ff247560cebf57e5da813b0319292fe181b326fad8c5558edcee15d1fa7452d9298fb4f365287718279a38e304d17ada8799833d5037813065aa1

                          • C:\Windows\{14E434BC-B76D-4485-A813-69173F61A18A}.exe

                            Filesize

                            180KB

                            MD5

                            8f6d22a459302d928d83f0d74a07f3f4

                            SHA1

                            0e643ddd955e871bcedf0a31eea601f0733a93db

                            SHA256

                            5cc609ed581d2c5c759c038a2298f01dd1f2be09e87a3d4ea0f554d3202c4cf5

                            SHA512

                            a0bf92d99a03ce7e7b9f8c60f31b21d3aac4a7b926b0cea35e5e996b841fe7210d10ba48c7442e8fbe910d2c8f42fc3ae6e626e7b41bac56d63ac9a7832ee1f6

                          • C:\Windows\{24D77668-C9A3-4c95-AFF8-CBF046E7B5DF}.exe

                            Filesize

                            180KB

                            MD5

                            ccea8e5a08fb2cdd0471bc0b239f99cb

                            SHA1

                            7200ac53a349f0fe1ffccc6e3aae714aecf3b10d

                            SHA256

                            a9adbbbfad704f67e285e800d50c2085cb112914cb920e5c5ba86edc96796a5a

                            SHA512

                            2458ee7e3c9b727c32bbabfee8b7ca4a6c3b258b85a145dd007d1cce68a302d4cc6dd454f1619ff053f9194a82ac045b7972e7a2e66d9bdb605098f38d288a81

                          • C:\Windows\{47C3FAA8-CE21-4e93-B0D3-7A309C440B31}.exe

                            Filesize

                            180KB

                            MD5

                            d9f072eb2cf0293d7145c186607a4c64

                            SHA1

                            640f4959716109329f45b6d25b832cd78935462c

                            SHA256

                            89987172fc80502b13d13f201f7cc4cba6ff2a33144c9861f13e5d82affc47a5

                            SHA512

                            0af6737606045a9549e4e2af2ea2aadb2d459d75ee7de3b67290bbf8a50e10ac60c7ad1a363454ced3b764ec6b3fed618bc714da442a85cda83fc0414c105316

                          • C:\Windows\{4E618989-891B-4a7e-9DB8-967F85D90A67}.exe

                            Filesize

                            180KB

                            MD5

                            5e9494b78c102e84700e2aa84c62a10a

                            SHA1

                            f9d83261bc70bbde36bbae8c5282fb1084ee12a3

                            SHA256

                            033d040be3518cdf949614c37c371e8d7c82001998eedbb6949267ecfee0fb8a

                            SHA512

                            8a0cf9087ac31dc106e3e7f907ee42193567bba737d324b91c519ac33330d78aaf7dba53b199a27903f58e04401a72b9bd3b462e17940828c51ee336b5e74aa3

                          • C:\Windows\{56B7567D-A4F9-4294-8A9D-F05BBCF07220}.exe

                            Filesize

                            180KB

                            MD5

                            2f8d0c58228c3be0192c72d7243f6915

                            SHA1

                            b1f1ad87d96ceaf67fe768ecf8652d7fbab94e8a

                            SHA256

                            ac6d332a8b4b1bddde784447a4ac5a85a7b2d0644cf9fb56566d914ba486f4fe

                            SHA512

                            052b74d5f323f764d304c3fdcf4a14deec4e6299e9672de416f0507925cc3df98feac70975ddb97c84fa0fe83f057ebf4b5be7fb1a41954e08cc0efb318dc6e6

                          • C:\Windows\{65BAFEDA-71BF-465a-B514-47B8EB055536}.exe

                            Filesize

                            180KB

                            MD5

                            2f27da5ad7dadb64dcd72f05980c4c23

                            SHA1

                            16958ce24cb036ebe333336fa3dda39ccdc6f4e8

                            SHA256

                            ba4c4a936a049d1e37079f50a609746abd298389baa0fd02a305ce52bc70493f

                            SHA512

                            fc1d9c7f8340b34284f9b1a720c3568cda41f63fcf065c7de876f54a1b772a86e4d362e572fd4f68a488044814ff5a14001cba1b33dd4e3c5e58238d87bba264

                          • C:\Windows\{769EA581-0D6A-4e55-8499-4B205B4B5FB6}.exe

                            Filesize

                            180KB

                            MD5

                            e80957101e46dac47048f095361cc792

                            SHA1

                            ad670dff18267356fca22e5a3df1f7f1be43e1b4

                            SHA256

                            61ad110e759736544b5b72f97774b26866330273f02b9dc57d3ff34d94d29692

                            SHA512

                            191eb64f8803ef30a9fa7a94f82679b124c410881ef9261d7b18e09575eb9f14a4753a252ef50b90bd7cd2a65d9176962d6e0ec49ba88d3078672924ac93cbc4

                          • C:\Windows\{A0966E3C-9FB4-4b0c-8C59-6AF5E7B5033F}.exe

                            Filesize

                            180KB

                            MD5

                            e404162a26d3e14b9a045c561c9585ee

                            SHA1

                            e71950373fc6fff0d398253f5e6fd06c052cd014

                            SHA256

                            6ff76ac3849fc4bc3aab9059c9668baed4d7aaa8846fe2bcbae4649e75bf30b8

                            SHA512

                            dc5d487d0d31f9b5ac94014b046ad42ec5fc6ac4509d1960996272362b3aa4c5ea0f12c3630c6fd3f459e2cbd1fc9cf3b3697cc7ad73bf992208d570b262a1ae

                          • C:\Windows\{C4337CE5-4D70-4343-96C7-58ED89924E99}.exe

                            Filesize

                            180KB

                            MD5

                            78afddb9756b32aaebd73a6c41fe1c6d

                            SHA1

                            fd0f297fb05929c7a61dbce5c01f96076b915ff6

                            SHA256

                            2beaa3a5d48944325447b31e088f67b1fa52b54e39d4347c18ad998552a72726

                            SHA512

                            788f86e674dc5b2ebfca14d829fe264afc425853103d1bca03b82a36a088cd62031e215c5619789fc882668521eda00cbf666f3fa280eacf6f313bae97c1524f

                          • C:\Windows\{D12F4BC1-F4B1-4119-AC8B-1EA105F02046}.exe

                            Filesize

                            180KB

                            MD5

                            6325f5aac496491cfefbe624ec7440c5

                            SHA1

                            6bab07cc6d4c47bd92eafc9f03a8960b24fcbe41

                            SHA256

                            18bd9cecaef9e9a766afd2645b00e194e56f0aacd39b99840d38098c941c15a0

                            SHA512

                            a8d9312def9628f1f6fa99b388bb8c13da4b94b7e65964328d56769ddabc235d3be5c8e8c6fe2c90aaef0518137091525b6f41a5ee530d1af638d7fe43a2ae7a

                          • C:\Windows\{D16F39BF-EE46-496b-BB8B-8FC2367375DD}.exe

                            Filesize

                            180KB

                            MD5

                            c37ee85fefa7506f762f0c48c7fdc901

                            SHA1

                            bb215063fda31a6a47d4078991b70a66e96562e2

                            SHA256

                            6b2048afd90b944ba3a2b629313423a87bda0555d3ab340df8b1565281e0f597

                            SHA512

                            1f65d8f56449889c914df2647e568bb656b98aaac898d545c0a2018d978fef17dc1b29420396cad085b023ac78fd5052b5e67d3aa11c617b8a860d07bfef3c7f