Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 19:26

General

  • Target

    2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe

  • Size

    197KB

  • MD5

    34875d44a2ce978428bc2894caf4d84b

  • SHA1

    976d0dd34cd08717cb7cf56e224cb976b24e28df

  • SHA256

    217bede3f6528fd5e5610f32253c95f58d52cc4f6dd6abeb6bbc6d83b8c8a1d9

  • SHA512

    b19ed8f813e02dbb98281c7fad8ad933edfe9e323b3f3518861f36388c19cab88ab8fb306a3c95c92c8b3b65eb9402b3d27dea76df688d397506e34a2a2db7fc

  • SSDEEP

    3072:jEGh0oZl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGvlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_34875d44a2ce978428bc2894caf4d84b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe
      C:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe
        C:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe
          C:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe
            C:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2504
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{D4987~1.EXE > nul
              6⤵
                PID:2856
              • C:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe
                C:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1444
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{57016~1.EXE > nul
                  7⤵
                    PID:1820
                  • C:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe
                    C:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2200
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{D5F58~1.EXE > nul
                      8⤵
                        PID:1684
                      • C:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe
                        C:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2168
                        • C:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe
                          C:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1440
                          • C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe
                            C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3012
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{4AA19~1.EXE > nul
                              11⤵
                                PID:1964
                              • C:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe
                                C:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2008
                                • C:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe
                                  C:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe
                                  12⤵
                                  • Executes dropped EXE
                                  PID:2980
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{7EE3D~1.EXE > nul
                                  12⤵
                                    PID:1492
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{F7FF5~1.EXE > nul
                                10⤵
                                  PID:2276
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{AEF44~1.EXE > nul
                                9⤵
                                  PID:2492
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2CC32~1.EXE > nul
                          5⤵
                            PID:2344
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1FA8B~1.EXE > nul
                          4⤵
                            PID:2756
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{14134~1.EXE > nul
                          3⤵
                            PID:2824
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2876

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{14134502-6BF5-44c7-AE20-8E6AEE1EBAE6}.exe

                              Filesize

                              197KB

                              MD5

                              630e2f06a986965440c2d80ed3c7f1ed

                              SHA1

                              a904b36b5e18f3037171c0ffe1d7c26804717117

                              SHA256

                              24d6f58fc03da53dc2b17d26452a5898e798451d45b34bbfe7cf5fa1e41cca81

                              SHA512

                              35c368593b7526374b3ecf154d5c3eadae7fe32f6fc4fdf1ad58062ef154fc7287a61da34e3f146e5a9954593f1f87c3b14f4637a844ae515303b61198d9e8d0

                            • C:\Windows\{1FA8BEE0-A5A7-49a6-B065-B7E2557AA5AB}.exe

                              Filesize

                              197KB

                              MD5

                              4b3131eeb10cc11ffc17c2b1bfb6d43d

                              SHA1

                              ccea37d1a1c03abbd9733b72a73991e7bc0059e2

                              SHA256

                              ad769801d492cd5172fcf5adb2a85213ea5d54256cfb7d343776982f12b0c8c3

                              SHA512

                              9c36c2f24351f3a76039b7aea6f85a80fa004ac7980361ced5aa2364302eb0a4a03bcb5ab30500d7431bf3d9d81973c30052cd2881a42e444650bf8e6d84fa3e

                            • C:\Windows\{2CC325A3-AA90-4588-8D18-7F05B2EB20FA}.exe

                              Filesize

                              197KB

                              MD5

                              9aa685a5d370810e6de8bb4e033c0788

                              SHA1

                              e8a41bee0b05e74b3f21b59ab5c0afa9e83bf7a9

                              SHA256

                              44ab33427bb3c8e4817b4318f8d244e373c0f585947c5228c58eedcd080f75c7

                              SHA512

                              f9aa10fab39a0d08e65912652591d6317069e26575a73f2635a213b57c4626d2be822631447bd30061aa6a560a980ef8980eacc689a62bd564fa75feb4161b08

                            • C:\Windows\{36072C6A-E3B6-41e4-BE75-C1468C018B5A}.exe

                              Filesize

                              197KB

                              MD5

                              16b708062869c8d8f84571e2fb922b2b

                              SHA1

                              80e6b704a340ab3e7911f188f0955c2da3f386e3

                              SHA256

                              24aca6a3e929557676d78429299899184ffb6163c5181299a2f33f59ce4647d3

                              SHA512

                              635ee314e26361cf7e36885248b6e1d68e868187496434f5702b8b18134d15c030902361036903decc330ea084107dafd1bc090da8096ee7639464e610a3dca8

                            • C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe

                              Filesize

                              197KB

                              MD5

                              4b8b586448f73c7c543c325ec9ddcf32

                              SHA1

                              1ff89dabbb5d9b20e6e7d3629344f1f93fdc3bc3

                              SHA256

                              461ebd58fd4e72538462dfa50dbf402190c435981e3f64c6af503f56ee630fb7

                              SHA512

                              2747dcc62a8e4e4480d0c2bce825c9f03a08cb3f7ed457c6a986f33b9353f036d6f0e81e2c37fa4d05417dd68f03615cfb8ffa65f0852bdd843ecc2f72ef9adf

                            • C:\Windows\{4AA1951E-8990-4869-BFBB-7F53BF16A18F}.exe

                              Filesize

                              48KB

                              MD5

                              09aa3c3be58cc79e11d37db80d7a79f3

                              SHA1

                              d67354a83bcc78ec954c762feb9c85c8955a758f

                              SHA256

                              e890c2c0cffffd7cbff5eb3e0b225ed1f863bba5dfef73b528775bf331546b5d

                              SHA512

                              17e5a1f691216e1c9b6ade335d2edc7fd11e42c75de2ad5779d1af54241447880edb60411886ebcb921b59ffc14c2d8c42ed813bcc95ffbdc83ab3e958d4fded

                            • C:\Windows\{57016F3D-F1A3-45a5-9CBC-93AB81A57899}.exe

                              Filesize

                              197KB

                              MD5

                              09c47c6b2587f16f0430843afa15fcb5

                              SHA1

                              979f826a1d1d4d893b670d0eba3320bd4aaeaed1

                              SHA256

                              bf734f34362a3e3acfe9737d3d29b406be4986463639e5a270b8276400fd6ffb

                              SHA512

                              c6aebd3c52189b7ce755453eac8f7bbad9c6ded9b98241493192ef3bba6b7a2f5bd25361e32d10b0a4c1df076e2afc0364e644de992ef56a43c115516d616f32

                            • C:\Windows\{7EE3D8E5-4F86-4ef9-8A30-63EE3F36DD65}.exe

                              Filesize

                              197KB

                              MD5

                              c460577fa1f90acff8619695f5135887

                              SHA1

                              7ab45234466d1abd4134d486a357798a6de7bf34

                              SHA256

                              fdd0c86b3ba0b4be17bd193cb8f5c922f287e98baa51a9aecfe2714c2a49db00

                              SHA512

                              1877d4a981d3a186e0b22197f180173441403528b66778bf3cc618310868d1e7a6f662be0d10e43c4658ce8f8440fa8ab5d7ee7d8e8a830d91bff043968fd413

                            • C:\Windows\{AEF44FBE-B738-4ed4-A801-23D2EC0C2687}.exe

                              Filesize

                              197KB

                              MD5

                              0f381ebc9cea5785af9c712e66bd6983

                              SHA1

                              10939e7837256a06bde4e9979a8b14593a755659

                              SHA256

                              8204115e92b2fafc10fdd33fbc19e0709fbb67e18d7d45db58f2b76d0c48d0ef

                              SHA512

                              f0c942b5b6df35f7b70ebdbe1b787c63072ab2a07b522bd896afce4aa36cf36859375306f373bddbe5af4d1c37e00f486dfd389fb1ba5c6e45a236b081690b83

                            • C:\Windows\{D4987CD6-A9EF-45a8-9D04-E8502E5C4B5C}.exe

                              Filesize

                              197KB

                              MD5

                              b6f32fb152620666dcbad3c5c3fe337a

                              SHA1

                              16451964ae8fcaefd646798e16bc2b8707b4b494

                              SHA256

                              41cd64be4676bc7a49e76747f1ccc5cd771c91ca4b19083c0c62f32d2974a4ae

                              SHA512

                              a0a47cd68f6fca0caeb9d96d106979b0ef87e442ffe749d4a1bc52637ec95a7354faba27647461af9b96227cc087678fbdc440165be9657eeae11bcd102e8d97

                            • C:\Windows\{D5F589C3-C003-44f2-BD3C-0F9120747ADD}.exe

                              Filesize

                              197KB

                              MD5

                              ca91a7685ce0fbbde32f2e5fb997c906

                              SHA1

                              d38f52227aa401dd515ce982be860bb6bb35ff60

                              SHA256

                              989f2454ec6bcc79f0dd949aeb493f8c25665e39106fb0ef9b350a756c1f358f

                              SHA512

                              fef3da0d4784a5eb427ab7e7bf0cfe41b2287c9adbe1b6d2db761614593bff8de9235d3d7066ece0828288f5a853b315a3320e5efab8f3dccb78aea35763bb2d

                            • C:\Windows\{F7FF5247-82D1-4fb1-96B2-E951BB6C2AAB}.exe

                              Filesize

                              197KB

                              MD5

                              5bce38462c0a58e01b27de0a220b5a78

                              SHA1

                              9899bfd26d85cfd07b2109cac05b28e2f15c344b

                              SHA256

                              ecb8421fa8ab364ea3af72f5e58c601c246eb73bb98b2c073620d5612bc06d29

                              SHA512

                              d58c4db83b1933e7ddd85aa256810c376e0a03c44c31f8455287694397279e1df3df22f1ac08c43191e16034a3c822a3dbfa08f2cfa562e169c465ab198e25c6