Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 09:39

General

  • Target

    2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe

  • Size

    408KB

  • MD5

    3e21e43241c2979bab9ed04c77d3e8cd

  • SHA1

    00af89e1fb175b1de3eae77baf3930a69f1d6784

  • SHA256

    dcffb6dfdcdacfaa5830a04aaa3299a086e99eee43dd57805ae2b2d0b78fb9d7

  • SHA512

    bb4d00e93a5ffb684be2fd5965a4fcdc978654e9de248fd5e3ccfe0acac4b42e92dd984315510c16de8cc58d29c13634e4e36ba2ad65f416f3517035d7df5d59

  • SSDEEP

    3072:CEGh0ohl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGfldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_3e21e43241c2979bab9ed04c77d3e8cd_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe
      C:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{81841~1.EXE > nul
        3⤵
          PID:2684
        • C:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe
          C:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{9F4A1~1.EXE > nul
            4⤵
              PID:2620
            • C:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe
              C:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{93E30~1.EXE > nul
                5⤵
                  PID:2908
                • C:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe
                  C:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2872
                  • C:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe
                    C:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2436
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{F9F96~1.EXE > nul
                      7⤵
                        PID:1344
                      • C:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe
                        C:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe
                        7⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1628
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A1946~1.EXE > nul
                          8⤵
                            PID:2876
                          • C:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe
                            C:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe
                            8⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2860
                            • C:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe
                              C:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe
                              9⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1420
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{645DF~1.EXE > nul
                                10⤵
                                  PID:1972
                                • C:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe
                                  C:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe
                                  10⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1320
                                  • C:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe
                                    C:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe
                                    11⤵
                                    • Modifies Installed Components in the registry
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:684
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{84489~1.EXE > nul
                                      12⤵
                                        PID:1708
                                      • C:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe
                                        C:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe
                                        12⤵
                                        • Executes dropped EXE
                                        PID:1780
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{91ABB~1.EXE > nul
                                      11⤵
                                        PID:892
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{34B22~1.EXE > nul
                                    9⤵
                                      PID:1268
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{70D1C~1.EXE > nul
                                6⤵
                                  PID:1604
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2772

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{34B22196-B4EA-4ea0-AFB9-7F102CAFE314}.exe

                          Filesize

                          408KB

                          MD5

                          90e1d9da389c2863b37827fa9b0fb981

                          SHA1

                          36185511315868861f0de9bc75f2b3b282979dfd

                          SHA256

                          4f0abef16dde83209046e2c50e1d9653f4b855970c2110e2235c93c7de52056e

                          SHA512

                          878081510a8290dbfeb8bef78dadb6e34c80e3a4cadef47e3a46deff95e63f77b75f6ce34f860389e9574970014a336ab472ba1f6166e756005c8ce2ebb91c90

                        • C:\Windows\{645DFEDC-7EB5-4869-831C-F7965A64F67C}.exe

                          Filesize

                          408KB

                          MD5

                          58e89d5bec81894e461021ee2f4d2070

                          SHA1

                          2d8692b74a4873d4f97d1f9096026800d651a99f

                          SHA256

                          d2a0915f42a092fac3d7bfddb234515c99f1d6d6000af35a2faf2fd71e561fc5

                          SHA512

                          b4f4ef2670e1b2dd01c65ee2867cbf0921a9a8e7f6e77da51f8e37c63c34294080d1089cc240e312d708b0d041afe46f3d6c917ec461b59c2456c4d0b287803f

                        • C:\Windows\{70D1CAC8-121C-4001-AA72-828218D15DA5}.exe

                          Filesize

                          408KB

                          MD5

                          fc86426bd8f7607e7ced690ae700f705

                          SHA1

                          f3e5eefaa2c83e4fd21429c176a1f5da02e7d89c

                          SHA256

                          cb48e96f08b43857efeda49fa148689a6ea28cce3237d8074b8bec1171e2ae85

                          SHA512

                          d8444412aafad811e3e393cff763f76026d7eb2fd78a47ef20200587dca0c1ffe9b2110070dfbcb89ca302bbb399b15222f3ad486f0609af43766b77233b7b90

                        • C:\Windows\{7B3F9359-DA07-48ed-97B1-842C8787DDFD}.exe

                          Filesize

                          408KB

                          MD5

                          e19197af6b02ee8cde062cc91291f578

                          SHA1

                          8dd5aab3f551cc769873fcfb5b3fa222f31d3945

                          SHA256

                          13a5ae64232b26da44514629ded84ae936aec9fc925ac8365ce76f10d95f1013

                          SHA512

                          2fab5bfbb3ae8fd36c1a8047f229bbde25b7d191adcc4c50aeef971bba450880474b36aa02d4d70fb39eb97de95b64f936b93dc0f12274a6cde9553d3736dbff

                        • C:\Windows\{81841C49-18A1-47c4-AABD-290C43F7CF23}.exe

                          Filesize

                          408KB

                          MD5

                          11de01f50636e43fc5aaf75651a42adb

                          SHA1

                          29a743366562e32d9c81d5e8a8da42d03a951f2c

                          SHA256

                          a04a44532b065a65a1081af88a315b9929f629274bff6c75d73d0b651a078f2e

                          SHA512

                          6c32e97e09b5ffb4da2050f0c3316ac985910cf03e7669a31431063164d7e22abb72ec0cff454b1f6e31a58bc6009b22ef85bca4e3be50b01c29ece1bad41516

                        • C:\Windows\{84489D00-E04F-4250-A8B7-2E4DE6D5D0A7}.exe

                          Filesize

                          408KB

                          MD5

                          22d4ecfacca2fe8b752e7757bd5406b2

                          SHA1

                          3eba64fe403df21bacc6dcf0b1c3b8e1c67d0f73

                          SHA256

                          6fe4d12848f989badbc04a1ff67631bd1801469e565251c19635b0339e5699ab

                          SHA512

                          252ab2c93a2ee2e9350658fd23bf8038ae7b096c1644db0087de1682044a506118fc0e6706afffb9f45c3e317e1fb03bc0399eb5854804b5e989aba0d651db2c

                        • C:\Windows\{91ABB085-3D9E-48a8-89EE-B2228E7ADFDF}.exe

                          Filesize

                          408KB

                          MD5

                          f741b41bc09c46ffe0d31995d52b94c6

                          SHA1

                          d454899b87f3c2da63c9c00b01b52923eb030306

                          SHA256

                          e291f873b246208096eb0411a3583570a91fbb403bc2b172c219f2ff9815c101

                          SHA512

                          f16cd05e9c91d25670f7a423dacc4beb3727e111a15ed5b1702d09f63821ba9b7df7d99e65ab3f5cf35ecd19ecc892b899886d7539b49289dcb99defee375bf1

                        • C:\Windows\{93E30C28-3B0E-4ecc-BB1A-AA748F1577AE}.exe

                          Filesize

                          408KB

                          MD5

                          7ed0c5a0c6f51d7461f23ebb46fb3f1c

                          SHA1

                          e6a34e43e08fa06fcb52217ccf7ea3da8327df28

                          SHA256

                          29f252ef6be166f37ec7eb0d968244c30f4360b2551fb466da86d9a2c579538d

                          SHA512

                          23702b02a97d11915d1c6bcf955b492db6991a581bcdd1b18cd804ff0b01aaa69a2f01848eeb3f87a61cff7d2406e0c7a2ca150520b1154405a07862a1e540cd

                        • C:\Windows\{9F4A10FD-3669-4794-9346-2525B1B877FB}.exe

                          Filesize

                          408KB

                          MD5

                          961969d12110348d4c79857dee7786cb

                          SHA1

                          e636d4240e8d7bbad9ad881706c0ae14019abe70

                          SHA256

                          9d00e10a1d42949d13982b6eaf6bafe3d674402821e2ddff58c74c00a1cbe3d3

                          SHA512

                          f101626576a72c7259011ba61d42edf2d5998a88b56108e3713c43a14377a1ba97012a9ce54f0d91ca0527b51f61b9ce5eb02a5c5effa2dd2e065614f03a021c

                        • C:\Windows\{A19468DE-4A1D-430d-B936-D3F61186A622}.exe

                          Filesize

                          408KB

                          MD5

                          3de6eec7bfb4c96d5796d38cda76eb13

                          SHA1

                          19d62a7848b55f63d2eb313e3f6a813ed329e7d0

                          SHA256

                          6b62a73e8ca8d88d817e694e5b123a9df5005cf4f83cf14682d1fe465c8afde9

                          SHA512

                          a762454e51d158a879d6f283e3b5e799c7b418e406ddb57f874f5313d113ed04ec544e1d1592780651ca54c5b0c641c2b8b6fc7c54a30b9fe7affa738d795d4d

                        • C:\Windows\{F9F96481-578D-43f7-9C61-87359EA0F269}.exe

                          Filesize

                          408KB

                          MD5

                          3be38f7a71cab9b7bc6bd548c217bda5

                          SHA1

                          0efd18e6ebee96a450fd68f5620bc5f0e8b2b391

                          SHA256

                          55744285e55eaa3cb57a6a24354a01ad3e09a9eab2ecef10044ecd9b68fb6818

                          SHA512

                          19c1621ff326285cec01c6fc3ff5836b44297f1ac85127b7a5ccba20ee6959cf0e2aa312725972fe871e3b4173f0bdadf086b31753bf93db39d09a3d242b8127