Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 18:57

General

  • Target

    2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe

  • Size

    180KB

  • MD5

    ac1116f298dfcdc033f2ecafd0f6a5e2

  • SHA1

    10353a1796232f543a359dcc606379d3ad46b702

  • SHA256

    25dc3bb4893ab9b796c473694ab4ffc1df973134f33c8725452b20b44693306d

  • SHA512

    a0069b570cc21492ffeb4ca27c9f93496bebfb9de8a5fea2c57db6ce7db380337ebde7226f63ba610a7a0d3bd5e9d851385531c3d573288695fffe12f5fed0b1

  • SSDEEP

    3072:jEGh0oulfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGsl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-02_ac1116f298dfcdc033f2ecafd0f6a5e2_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe
      C:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe
        C:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{2E466~1.EXE > nul
          4⤵
            PID:1296
          • C:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exe
            C:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe
              C:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3308
              • C:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe
                C:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1732
                • C:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe
                  C:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3476
                  • C:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe
                    C:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3592
                    • C:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe
                      C:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1428
                      • C:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exe
                        C:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3512
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{476C8~1.EXE > nul
                          11⤵
                            PID:1348
                          • C:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe
                            C:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4628
                            • C:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe
                              C:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1272
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{20FB4~1.EXE > nul
                                13⤵
                                  PID:976
                                • C:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe
                                  C:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe
                                  13⤵
                                  • Executes dropped EXE
                                  PID:224
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{C901F~1.EXE > nul
                                12⤵
                                  PID:2904
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{88295~1.EXE > nul
                              10⤵
                                PID:4556
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{861F3~1.EXE > nul
                              9⤵
                                PID:4400
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{0ECF3~1.EXE > nul
                              8⤵
                                PID:3764
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{56923~1.EXE > nul
                              7⤵
                                PID:2444
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D3DA4~1.EXE > nul
                              6⤵
                                PID:4940
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{82CCB~1.EXE > nul
                              5⤵
                                PID:2908
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C72D4~1.EXE > nul
                            3⤵
                              PID:380
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4408

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{0ECF343D-1A13-4c20-8AC7-BD601500C618}.exe

                            Filesize

                            180KB

                            MD5

                            63ffaf565bf63e55b840b5e77e701b28

                            SHA1

                            24c73d6f8193e5d0a004085b5eaa57bab034e748

                            SHA256

                            3d1895ae5ec0d9e130ff1375328ed91a3d521aeb0c6a395d9a10cb3d293fc98d

                            SHA512

                            7dbe38a18ecbe51b8f5af8ed7bfecc78094900ec9e5dcda3a7989fcfe4bf45e81f27c2d16f66e29396c425d053b377470a391bd76b1489de36650263af51f47c

                          • C:\Windows\{20FB408F-BAAB-4358-92ED-5FDC2840C65A}.exe

                            Filesize

                            180KB

                            MD5

                            93581b7403bf9bddc3bbd339b50b1582

                            SHA1

                            3e1f5f9eb9c5708d8d928af469ef4b478c42eef6

                            SHA256

                            35fc2fab51f6a2fe120bd5aa9f0542e3b3d0bbb3ebaf7388119ab24ff321c1c9

                            SHA512

                            4455721c25c6fde57b0bcee79368b1eae49dd0cd4a9ef1ae51e00212c3d29c832deac8d3e82e4c3a57edfa17a2797005e9df50254e516af99d94eee9b647b865

                          • C:\Windows\{2232F893-EE8F-4d0d-96F1-7FEA47DF7FA8}.exe

                            Filesize

                            180KB

                            MD5

                            8931e86c1de02bf9775d2c664f78e9e6

                            SHA1

                            6417528a6880cd001c8ad0f30d8975a4d9afef25

                            SHA256

                            a4ec7640b06d62c0c493a57667916c8be008c0889479053d9770a245fde53d8e

                            SHA512

                            a8b078617d1d609f9d236516446ee7f8d5db08e7e4273c9612f2b7bc6ce2dea03f487e8eaf17ec2859cd7488dade9d64427039e6925980227282925d30cf9cfa

                          • C:\Windows\{2E466A40-2FA9-4373-9C52-AED992E19547}.exe

                            Filesize

                            180KB

                            MD5

                            fc128fb4988ac03077a8ae9f35e7ed91

                            SHA1

                            7489985f7f26aaf32d93141265dae6132477c58f

                            SHA256

                            0834d7a6b790c1c427c4c92949eb547f73ba8eb136b8a7c4a26db10a9af239c8

                            SHA512

                            dfa38ca62368408eb9d10fae3e3f2d7067b6739f56c0c63ffe6e7bd9deabd47bc4acbca539fa6ccf20c64d641a45c4b6be6194c3956f7d8d4432e4923d853779

                          • C:\Windows\{476C8AE1-00AB-42aa-B755-379040502610}.exe

                            Filesize

                            180KB

                            MD5

                            b0f2e59b556bae9c948b7abddd810fe0

                            SHA1

                            15e0e10af904ebf298f8df2d75b7e3113a740db7

                            SHA256

                            284434e78d4c34d362ebd52c97fa67fe1ea71339b8acf525724ae3ac0bef1bfa

                            SHA512

                            999d72added672b97fdc3ec14b737b802b6970f37a9dd39ae42ad4e01e76f1b4183c3a6526a538dce310e68aea02b1aafd50f0d62d5aaceaa102dfd8b441522f

                          • C:\Windows\{569232D9-7E2B-4b9b-852B-E5FAC2184E95}.exe

                            Filesize

                            180KB

                            MD5

                            2b19c60ea7e770438e77c1bbbaabce8f

                            SHA1

                            5c4d33ee9c546550b5c4db02357e68aeebfbf8b6

                            SHA256

                            b55023de58c2bea98b2c313a579c4d7dd1d0acbe2478b462874ccf19c39aa844

                            SHA512

                            5d182f93c87179e2417fc434b99f9ba2dce627cf1c0e0b3eee7255cff19962f0f8a287646223cb49232f585a58ab0ec75cca409e2741879876625de020054ff4

                          • C:\Windows\{82CCB330-A29E-4084-87AA-98895252BE99}.exe

                            Filesize

                            180KB

                            MD5

                            8592ce61edeab83fadcdfae1e6df4c10

                            SHA1

                            3e6ab6418b695f18b86662cd55828a71d5e711d9

                            SHA256

                            208c33ca17fefa231ae119867563c9ebdc91ff2ec6bc6a12c69a3d990392d14e

                            SHA512

                            95dcc63d941a3048198589f906ff6f88fab045974bce0b4da9c2a978fdc1e838e5f836c1294c85b71f44660d5ccb68feeeb95df258f79d5d62d0830d5ec8db85

                          • C:\Windows\{861F3F82-A843-4e9f-A7C0-3D96F2EE854D}.exe

                            Filesize

                            180KB

                            MD5

                            cc791b1973f178cde6617ee304b7451f

                            SHA1

                            1521ba1a37b58283458b1c2b4d534c68b85ea7c1

                            SHA256

                            14ae79051721efe5d505777d1b3065cd998e40734f1aaf59349e7b2da83f6ba9

                            SHA512

                            4eb2417cd7d0c68c6eaf32055c922dd5a1cc0b25ddecd8fadc5527db3189ed2c7e31224f3423099538ce9e3426a97c57dddfa89d264fec9ab45331dfe5724ae3

                          • C:\Windows\{8829530C-3FD1-49f6-B603-E99AF0E4B341}.exe

                            Filesize

                            180KB

                            MD5

                            f63562cac44545d5d29a0714c82062d9

                            SHA1

                            cc89b56725d1d2c9e4acbbf1c5fd52c232bdd24a

                            SHA256

                            0e3115e95c111beb069355acbb76a422041a6c54188274158d6cfcb02260b051

                            SHA512

                            cb404471ec8f23163af4204a9d1cc5da50c1596bf69b805b11c4fdb5f31fd7bf4942fc8ccaa042924cfa478d79f2358d60b0fc5da7576c890a3a2517a9aa0c30

                          • C:\Windows\{C72D44A3-7A22-4054-8263-EC09A056EA43}.exe

                            Filesize

                            180KB

                            MD5

                            8a70cf025d608f5d0054f5ad2bf5590c

                            SHA1

                            b42a0010a5900517863a1a2ab0a8d1b7c3a9c9ec

                            SHA256

                            7300d800b05421592be85427bf8d4c00d6ed832f4ae36752e31e9225cee17a3e

                            SHA512

                            ffd565c0388284d88d5242b167a247ee19f1c0962852fdeeaff1f87a1adfe2a1540442568dad4a93989fb3007f25261c0c65ad6da65b8e88e78ddf00b937b927

                          • C:\Windows\{C901F979-270D-4ad6-953F-DF85E71F13CC}.exe

                            Filesize

                            180KB

                            MD5

                            9d2319ddee4aaec02c83459ee45830ee

                            SHA1

                            b8832febb1eafe33c6374cf6c9dfde4aa64f1a4f

                            SHA256

                            fdd9c1637de475a69a4df4141a3f0745a8b198565e73dc41b32e610d0de0b116

                            SHA512

                            19385862990ab81896c68dd26642309cbe9c63b2a0f92b4e3011e25d1055e7e9d79390ad25b1e67d37ef995de5d2ac66b8fbf86a233b6a2123ba1a08e0a460fb

                          • C:\Windows\{D3DA434B-2FF6-41b6-8161-13644146549B}.exe

                            Filesize

                            180KB

                            MD5

                            82f543b4ed10d9c2f180c1432b18afbf

                            SHA1

                            a7f4ddac7e12046bb10df41a8cdfeaef989127f3

                            SHA256

                            a94b180798779f8e4b59b494ec937041d58d96942e8823559dfae9e141ba20b8

                            SHA512

                            79a343af3e46480f7854861b9379d7b31640ff77324853021318a48ffa9eaead12610ac4bb70abe4ddc9e9ae99b75f403e411aa7bd0a46facec30531bd24cea0