Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 14:44

General

  • Target

    2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe

  • Size

    180KB

  • MD5

    4a0acad2f7bc66e059ef52d3899c9f93

  • SHA1

    d96a4a906b646ad937d950947a2bcc930c62c823

  • SHA256

    49ee024e576c46fef32737e5d787ab61f1562fac8bcf09e16fa6535c16c8e240

  • SHA512

    61d6cb6ff0087db65ec972728b86b119dd9410c1bc976d3d764a471b43f5863db17b3d4c2f511c538a793333603b441d2d44461f596878e55b4a1a61aebc9779

  • SSDEEP

    3072:jEGh0o1lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG3l5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_4a0acad2f7bc66e059ef52d3899c9f93_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe
      C:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{E98E0~1.EXE > nul
        3⤵
          PID:3020
        • C:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe
          C:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{3DBE4~1.EXE > nul
            4⤵
              PID:2196
            • C:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe
              C:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe
                C:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2128
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{2ADF8~1.EXE > nul
                  6⤵
                    PID:2988
                  • C:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe
                    C:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2964
                    • C:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe
                      C:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe
                      7⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1584
                      • C:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe
                        C:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1800
                        • C:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe
                          C:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2660
                          • C:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe
                            C:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2088
                            • C:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe
                              C:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe
                              11⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2808
                              • C:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe
                                C:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe
                                12⤵
                                • Executes dropped EXE
                                PID:1140
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{092A1~1.EXE > nul
                                12⤵
                                  PID:1100
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{C017A~1.EXE > nul
                                11⤵
                                  PID:2112
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{A8ADC~1.EXE > nul
                                10⤵
                                  PID:2440
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{040DA~1.EXE > nul
                                9⤵
                                  PID:2152
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{B0A2B~1.EXE > nul
                                8⤵
                                  PID:304
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{69048~1.EXE > nul
                                7⤵
                                  PID:1820
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{88155~1.EXE > nul
                              5⤵
                                PID:1980
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2468

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{040DA7F6-D705-4555-9584-A7FF59DE5C70}.exe

                              Filesize

                              180KB

                              MD5

                              c60c773a609734aa91bb9a6d62b2fb94

                              SHA1

                              a6d805954576600ade91bd03309f7755d7122aa5

                              SHA256

                              faa9ec3dfe30bd084ee43545ba936f56802cb8df15d21bfa0e47ab719ddd2f7e

                              SHA512

                              3f603da0e8a4251b3923516d6a6693dca2ff61033208b246e9e5dfb2161d59bef3a7c3ecff2ebfde20ddda8a31d03af4183f3341535a1c4870546820bb0f0e10

                            • C:\Windows\{092A13D4-885F-4ce2-BE21-25D137154E87}.exe

                              Filesize

                              180KB

                              MD5

                              5d4410264a47b9c3263720da33c65b0b

                              SHA1

                              74192877a347e4dd6f2035e264ef9e15efc12960

                              SHA256

                              12177334ef4c6075228650fbb8ffecd7120988cedd63de2544694f7442661f15

                              SHA512

                              91d5567a6b0de830640474f7f68702a5a95bdb40a8b2b78085c6f1467a472cc24c8ad5674470eabf1e7c8ec403b127f716a775e9c7387c2eb779185f9b7dd725

                            • C:\Windows\{2ADF820B-B177-42ce-BF47-553BB6418692}.exe

                              Filesize

                              180KB

                              MD5

                              035ba0f80460700b68455b681e809704

                              SHA1

                              998bcbf905fbdca0f1171c799d5436ca665604f4

                              SHA256

                              5149fb0b745e857b56eed562bbc15641ba108a6c7d45b8e6ff73a9de543553aa

                              SHA512

                              4ec86cc4a8dfdb35719c717e30445867d173f2088f69bfaaf7e6e32c16885254d0587e697d6a64601af13c00072860a220f431dd4dcf69c29f99e3b5db75f2a4

                            • C:\Windows\{3DBE4258-A498-483f-88B0-D5CDC8347671}.exe

                              Filesize

                              180KB

                              MD5

                              ca90b33421cbf298b056e0e2951246d7

                              SHA1

                              0d7de80d1f6bcabdf6c1bb218cf7ea32cebf0f5e

                              SHA256

                              e7b623e1ca2a7c0c72dc0fb9aa1e71f3b01d48a85b2ebff73fac3624ad6ad7cc

                              SHA512

                              71831cf4e7852da393d8797af49746699aa611a6dc67d5b01e47c21b0e4e8cb261e21eeea4870b9416c935a2b55e92c0b909182cc9a0a3ad4bd733dd1cd7f9b7

                            • C:\Windows\{6904874A-61A2-420a-8D6F-98B10FC84F68}.exe

                              Filesize

                              180KB

                              MD5

                              86176338d8d92a3c7592b9228288f490

                              SHA1

                              f0f26aa0a9689252cc2bbeeb221ef6cdc2a57bc9

                              SHA256

                              caf1ff1e22230cc3bfa06e8c43ec27840e37ce47445de158a2d5b9b2e4f56133

                              SHA512

                              09a0f207d06672eac1140d5744a14b8ee27d3ca98eda06a46f807f69429906b1419bb4d670e76ff7122ba24d2111c9683042460c9c89a68ccdbef8df22be1df0

                            • C:\Windows\{7134BA7C-FB0E-40ea-971A-8A78F7EB7E32}.exe

                              Filesize

                              180KB

                              MD5

                              5b80c1fd9164db90b4010a5d6545eb78

                              SHA1

                              55759e956a931ff61bbfa55dcb1d00bf291f5123

                              SHA256

                              b27df07315298a7e169ca8bb6df35bab86b0d391f3898fe9c06b168486a64f65

                              SHA512

                              bf6e10534084b39673859a16db8c2fb9ccc5b9a54357840f60184cf0c3f940af2082a1c22c58194cc6c41d526752798355e33f05099f4c32e0926f18aa006e98

                            • C:\Windows\{881557F1-304E-4ef5-914D-9A2E92E1A728}.exe

                              Filesize

                              180KB

                              MD5

                              5d27e0424f7dc55f103a6557ff3c6772

                              SHA1

                              cfc7801f68bd3c62752b660b1096081dc03ae15e

                              SHA256

                              69f34cc9bd7a518f4a2ecea4c57810331736d3d2567efc34174787210c80838e

                              SHA512

                              c4cfd146fc9ed8f059cae747f6298cd28ffca17b9aa0d9a16f1e09c33e21673733159730f8e99f0a2a826287856384829b09cd7f663008fdef4390dd45d952b1

                            • C:\Windows\{A8ADC1FE-B463-4f75-B3C2-D4F1079808B0}.exe

                              Filesize

                              180KB

                              MD5

                              76dcde492d3f6e0d0c5c2604dd8142db

                              SHA1

                              5fb5fe5643679fd39837205601a9547ee2a386be

                              SHA256

                              d429f06df214b8aeed1004b20a275fd67b9fa3299bc860eeaa1a69553b85dfbe

                              SHA512

                              505ff60da925a2adf6c641d38180a4e4abdd38107704592f31fdb53935ad38d420053db8febf28bdf45cddffefb790f285ee5c25c3c4616fab433657188c5d8d

                            • C:\Windows\{B0A2BD93-5928-4d51-8599-06AED23B8153}.exe

                              Filesize

                              180KB

                              MD5

                              0e957ec954ab884dfaced477a46add91

                              SHA1

                              0e22894979f37d2b13fc12686cf2a39bde54d8a7

                              SHA256

                              60ccda1f71748b9bf1639ff2a00a14620ea6658df796dfd48d140a3a990cfde6

                              SHA512

                              2c66b69f7b710bd1cd197f943db2c4650fb1c0c4873cf49eb9ed2c83c685def71a12a2d294cfbebf213ddf6fbb0caedf327dd6bd8fa82121211ae5f992b43265

                            • C:\Windows\{C017A41F-8B7F-441c-B81D-31C73B9716FC}.exe

                              Filesize

                              180KB

                              MD5

                              cd465a64272d1a93ff3ae2c54e18d838

                              SHA1

                              525f73e8fe411f9ce218b4e58f4c55e578778cf9

                              SHA256

                              0100952883f7ec8e5290b4ca8ca4d8ef65b818cc804831c5d9bc79b9ea8350b7

                              SHA512

                              6384b3bff2fa88c3dfee33c12fb7b53525e99e564be2aed8bc6944a9258af23a7bf93cfbb7982a87391e246be36e68894b993361039791a93dd09eae64594bac

                            • C:\Windows\{E98E008A-9F77-4957-BD84-4DC8E35EA051}.exe

                              Filesize

                              180KB

                              MD5

                              aea25071ecc31826573cdbf47eefc66d

                              SHA1

                              f1f9a792473d3ade01442d36170f51fae1138008

                              SHA256

                              bd6f3c24c0a5472a593f527489bb0765a9b65b7bc0d7eb63e945fd76c7b530d4

                              SHA512

                              b3932946ac916c4a86331f12318a99f809b03ef126dce86de66f835edf81aabe01e544ec9292b37b0d8840748658d8da8c79902365260f4d78b0edfbddce93ea