Analysis

  • max time kernel
    164s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 02:43

General

  • Target

    2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe

  • Size

    372KB

  • MD5

    f1e60aa596eb60939085f33ae13e3120

  • SHA1

    aad82b114d279da0f0192ba71aaf1be9a3bf9d1e

  • SHA256

    b5329c84ca73b52df9c4a7310625c6d6455865d9b6a97f462bc946a52c48ef64

  • SHA512

    eb52302a68c72fb2dc79f08ba2fa834b5e522b92503089cedcdc54e87290a929a24dbb33a8df28586bac69c1032aeadc3a4c4a92bda2f9b496a422189ccf00d4

  • SSDEEP

    3072:CEGh0oXmlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGcl/Oe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-02_f1e60aa596eb60939085f33ae13e3120_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe
      C:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{EE78E~1.EXE > nul
        3⤵
          PID:1932
        • C:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe
          C:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4232
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{C898C~1.EXE > nul
            4⤵
              PID:3420
            • C:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe
              C:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3104
              • C:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe
                C:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:772
                • C:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe
                  C:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • C:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe
                    C:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:980
                    • C:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe
                      C:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2868
                      • C:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe
                        C:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4428
                        • C:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe
                          C:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3468
                          • C:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe
                            C:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2972
                            • C:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe
                              C:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:456
                              • C:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exe
                                C:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exe
                                13⤵
                                • Executes dropped EXE
                                PID:4792
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{AA138~1.EXE > nul
                                13⤵
                                  PID:4952
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{3BBB0~1.EXE > nul
                                12⤵
                                  PID:4352
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{8D4BB~1.EXE > nul
                                11⤵
                                  PID:4208
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{19FAE~1.EXE > nul
                                10⤵
                                  PID:2876
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{1C976~1.EXE > nul
                                9⤵
                                  PID:1964
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{5F189~1.EXE > nul
                                8⤵
                                  PID:1160
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{7609D~1.EXE > nul
                                7⤵
                                  PID:3472
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{4A3F4~1.EXE > nul
                                6⤵
                                  PID:2912
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{6FB90~1.EXE > nul
                                5⤵
                                  PID:1656
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4808

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{010802DF-9471-4972-B95A-155AFFE58E66}.exe

                            Filesize

                            372KB

                            MD5

                            8ca34a26b3b05e52ba7948fde94383ba

                            SHA1

                            5304ca082eee2b3fd73594735966ee95623f022b

                            SHA256

                            5ca91fbb28f558d081b8d94e1031ad7d603cc1a2efbd0f0db38dc78e9a804676

                            SHA512

                            80f58d745e8b401fce2021cb4c15b357ab3b8b03f34c66f859e422d021188ef5ac48c3c434e90878b0355513b1aeb7d90edfc178202c5f9e4669b8104eac44a2

                          • C:\Windows\{19FAEF6D-15CE-4fdf-930D-D204C22B2803}.exe

                            Filesize

                            372KB

                            MD5

                            6bea467ca9980467fff59fb9cda1c72b

                            SHA1

                            84b81032acdc9d577e9997514542d10a75f083c4

                            SHA256

                            0c5f588d51ff1b842434e056db04c4551a77daa8588491daa299ab7442802102

                            SHA512

                            fd8c504f8e4b9a0978fa65f16020a1b47d5d8d046745b470a14b7c07d953f3b00545c9d5a64af4b254883736441baa32e83e71bdfa431643ef40035e3f7b080e

                          • C:\Windows\{1C97613B-90F0-4451-9F02-8F370C41DC08}.exe

                            Filesize

                            372KB

                            MD5

                            fb926a7922536986c6e364e3da071d76

                            SHA1

                            a95ee5bdab5ffc8fde57b8d4de242329986f9f70

                            SHA256

                            7f2af5c1b3c98e5953a6e4420239b27f4e225f052d76d53a2fef0fa5bdd4f731

                            SHA512

                            93833f4c1ee91dd7abfa838560e4bcb28b07991ccaa9d9408e410f94114f7814d499b6fb7000ae9971f9058bcc0bd23666bbd427594fc9a391af33c792b05d1a

                          • C:\Windows\{3BBB0E07-1197-4b2a-97F0-46D9744601A7}.exe

                            Filesize

                            372KB

                            MD5

                            c45b064c2415f3a87cd949454b959289

                            SHA1

                            2ccf231cd885e86cf327b1b8640246665a7cb608

                            SHA256

                            a930537b40920b39d99caed13e92f62354174f847a93e4287c04173ed6cfa505

                            SHA512

                            0e942d6797abeb212a97bae3cd98d712650781a49bc3962f230423b057f6c006bf22122e6ffd4d2991ddc703a736c1478134303e1e6b19d01851b3344ebfa7f3

                          • C:\Windows\{4A3F4EED-13C4-4c7a-B230-7E4CC49DF905}.exe

                            Filesize

                            372KB

                            MD5

                            8bc0a6eb3ea97ea88a83e02f46ca3167

                            SHA1

                            52250ce560638672f50b654c3b75d0d3f56bb9e6

                            SHA256

                            75beab2fca47086536e903c52abf70be4d3855328cb997f4d4f04a1ceb601ba7

                            SHA512

                            0319993522503f7e9b4bc607d69558220b0233728a954344c8c3d5ee72774e1d5805afec9867e3595e70fce4bf5e5f6e6491b5cbc8a72a63e960f28e4cf1a877

                          • C:\Windows\{5F189D0D-6478-4b8a-BF3B-8ACF7DD852E1}.exe

                            Filesize

                            372KB

                            MD5

                            32fd2c3fc10f5acbf6a1af7c71ec58d2

                            SHA1

                            333dfc4154f1281f5645127d7696bb06e568519e

                            SHA256

                            291cbd369e1686fa1244e071ecdfc8b3204c936ef8f2f8e0f9eae9457a8022d7

                            SHA512

                            dd8005630c106d85e55b93b93a502673a8e715936378a158b9510081aa74196cafaaa223d6d4c10b1a003db05299d54222433e31070deaf639f99efc9f2ac376

                          • C:\Windows\{6FB900B5-196C-4b17-851F-8306F2B8E85B}.exe

                            Filesize

                            372KB

                            MD5

                            56bfc9ba5613b2f7035a68cd95fc3ae8

                            SHA1

                            ac9277d1d682bac8e7b5a4f71592788f1c621ffd

                            SHA256

                            e5203151317d9f9329bcdb03efc49d79ebd9395cc0fb701cf939d36b87010fe3

                            SHA512

                            72a880b0a721738467a03d6e66c7ccff29da32f5f076996ce86d5e8195a6746b432d9c32001ac6102c501392d3a05030d0b505e7c03a58211233301dce1dcca2

                          • C:\Windows\{7609DAC7-53A0-446b-9C2F-381D3CD23985}.exe

                            Filesize

                            372KB

                            MD5

                            9a4ad2e339653cea3bc0b578fa5f7ae2

                            SHA1

                            e7d5e71f86abd1ba52492fc505e10e9fd0523ae2

                            SHA256

                            d6275a7fcd0c25daa67ee41d56a88854ec9d7b94bf167f160ffead56ea2944f2

                            SHA512

                            815fee01623b6a2cd5a195c172bd4631c9ebd3e6d52c8d6c5837b49101c6fa2f09e79d8f1c840072e833030c0d4696cd1b8e99c8fe58e2f269fea51cb0e8339e

                          • C:\Windows\{8D4BB092-B8B9-46ed-84FA-18D7C84AE63C}.exe

                            Filesize

                            372KB

                            MD5

                            350c6e5b7cd1a6757ed0a42c6f0c33d2

                            SHA1

                            4b0ffd17e3d24b70074a42429a285ef3c30ef544

                            SHA256

                            40765cc2906665f69f5cad067a3d7c8523208fac8db4cfe09005e395c782b962

                            SHA512

                            77b8b507735668b4072cca261c578a0cb9850fbf73e19cb2d98d0fa7d27b33fee754fec03ce1466f48ae9568f2db90fa1e1bb2a1d153f9c489ec28e0d1d8a9bf

                          • C:\Windows\{AA138FAA-1181-4579-B2A3-DF5761B042C8}.exe

                            Filesize

                            372KB

                            MD5

                            e3fda891dda7a45e273b61b24cc1d1f3

                            SHA1

                            1eeb59b8d164c798c25cfd07167be1fac76f69fa

                            SHA256

                            5c59c0434990254a09def6887cff9c50f52f652d9660de6d52ca834eb44705eb

                            SHA512

                            de593ff016397b42b24112747c43be5ec2284b733c1af56dddbdd071606cabfd4ea43295aea3ec48a7d442d05a625e54eccd3f6897222034386dd9b6fcda167f

                          • C:\Windows\{C898C7F6-D512-4ff3-85F1-C81337ADE47B}.exe

                            Filesize

                            372KB

                            MD5

                            10331438899cd9666b4d281ea9a1c63a

                            SHA1

                            8948c32cb6393e141fd323cf21694f427786d441

                            SHA256

                            32128f9d702d80ecb315917dc8387aa475ef3267ea07acfadd91313e77ffbc7e

                            SHA512

                            0dc6a466ea15ab694e8313abfadee9fe2cbc3287ec47bfce1f73e9bf4a01cbf37e2a315f33dfff19d11bad84761bdb147707d5b6407dcacf3a314eded55a15a0

                          • C:\Windows\{EE78EC6B-BB21-444e-8D5B-A12088C457A5}.exe

                            Filesize

                            372KB

                            MD5

                            498e88d76dcf421a37a8721b70e38b25

                            SHA1

                            e37ab6110db24f43038b9228f1044ec10b2f977e

                            SHA256

                            499c6eb2aede8ad72891f5cc1a1477e306b7397515a5edff518acf3e58818e03

                            SHA512

                            1d3c261b7740b0caf354413bbe997332ab82708e2d61131bb1f76fe835eefe5d95461486f16b33fae8fb89795e4dc241d502df9e439209167cd674f8ca6d5027