Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 14:35

General

  • Target

    2024-02-12_7af93560dfe168c250f011a545317e9f_goldeneye.exe

  • Size

    344KB

  • MD5

    7af93560dfe168c250f011a545317e9f

  • SHA1

    c96d46a02263c00dd052444d1fa0f47eab85fa1c

  • SHA256

    566a6f94c75b8bcb4432c6964fa94f373e7e9b059c9b49ef9cef6b4068537d7d

  • SHA512

    9982863b97db4fa25481724641cca1e0b93516cc3fc8c411df39bc2321542edc582d06ec7fe40360b7912172d530e504a2e11bb8085dea8fa955fe6b610022fb

  • SSDEEP

    3072:mEGh0oblEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGplqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 13 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_7af93560dfe168c250f011a545317e9f_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_7af93560dfe168c250f011a545317e9f_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\{A96EE9D4-13E0-46af-B857-8073505919CC}.exe
      C:\Windows\{A96EE9D4-13E0-46af-B857-8073505919CC}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\{AE6A511A-DAA7-4ee5-9A73-A57E46863F66}.exe
        C:\Windows\{AE6A511A-DAA7-4ee5-9A73-A57E46863F66}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{AE6A5~1.EXE > nul
          4⤵
            PID:3848
          • C:\Windows\{DB9B3276-E494-4b5f-BFF6-DFC35D9452E0}.exe
            C:\Windows\{DB9B3276-E494-4b5f-BFF6-DFC35D9452E0}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5044
            • C:\Windows\{3300B959-BE1A-4d00-8B9A-888C4E2741A1}.exe
              C:\Windows\{3300B959-BE1A-4d00-8B9A-888C4E2741A1}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:472
              • C:\Windows\{341C338F-DC1A-4f82-A4CE-045FAF61E0C8}.exe
                C:\Windows\{341C338F-DC1A-4f82-A4CE-045FAF61E0C8}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1152
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{341C3~1.EXE > nul
                  7⤵
                    PID:4112
                  • C:\Windows\{45A8FEB1-5827-4b8e-BC7D-8387F5D0B312}.exe
                    C:\Windows\{45A8FEB1-5827-4b8e-BC7D-8387F5D0B312}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:228
                    • C:\Windows\{71A7D6BA-BE68-47e1-8CB5-E96CF4D4CF8E}.exe
                      C:\Windows\{71A7D6BA-BE68-47e1-8CB5-E96CF4D4CF8E}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3232
                      • C:\Windows\{AEEF3768-96B5-445a-90BA-9BAEE606E112}.exe
                        C:\Windows\{AEEF3768-96B5-445a-90BA-9BAEE606E112}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2472
                        • C:\Windows\{BF210C2F-DF8A-462a-A41A-D52C2E0C90B1}.exe
                          C:\Windows\{BF210C2F-DF8A-462a-A41A-D52C2E0C90B1}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3048
                          • C:\Windows\{7431CD1C-C50C-497b-BB1C-EC514798915A}.exe
                            C:\Windows\{7431CD1C-C50C-497b-BB1C-EC514798915A}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4464
                            • C:\Windows\{316171B8-4D03-4823-8481-FA54476A1E7B}.exe
                              C:\Windows\{316171B8-4D03-4823-8481-FA54476A1E7B}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1272
                              • C:\Windows\{45471AC6-F5BF-4aac-AD94-0A84A402BB31}.exe
                                C:\Windows\{45471AC6-F5BF-4aac-AD94-0A84A402BB31}.exe
                                13⤵
                                • Executes dropped EXE
                                PID:672
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{31617~1.EXE > nul
                                13⤵
                                  PID:2756
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{7431C~1.EXE > nul
                                12⤵
                                  PID:2056
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{BF210~1.EXE > nul
                                11⤵
                                  PID:4200
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{AEEF3~1.EXE > nul
                                10⤵
                                  PID:852
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{71A7D~1.EXE > nul
                                9⤵
                                  PID:2728
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{45A8F~1.EXE > nul
                                8⤵
                                  PID:4924
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{3300B~1.EXE > nul
                              6⤵
                                PID:4536
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{DB9B3~1.EXE > nul
                              5⤵
                                PID:4864
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A96EE~1.EXE > nul
                            3⤵
                              PID:2540
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4436

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{316171B8-4D03-4823-8481-FA54476A1E7B}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  a3887e6c2488720130b17dc4a944fcbe

                                  SHA1

                                  87c66db8f1f4f55c33ee474613a7dae3ea48d7bc

                                  SHA256

                                  612d2ac40d288f85799ec261d8a472f42fc1ea27481dafb0f1cc02874c2aff77

                                  SHA512

                                  c5555ddd97430b1595b08c2da1dc1d9a3e7c810ce89670ca34b444a7d1dfc4a43452a94da7e2af1e991931d04cb74fb79654cf9d6aa18729275bffcb3b06826a

                                • C:\Windows\{3300B959-BE1A-4d00-8B9A-888C4E2741A1}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  5ddd320d0c542a5481eff9bf1cfcb108

                                  SHA1

                                  4ff0c9c4f3af3d847584848ca48a3f5178333ffa

                                  SHA256

                                  8d56d3662dd8a0caa740920c0d2f759ea3dda341e218270521c6528cdb7ec869

                                  SHA512

                                  4bb165dd8abb806cabe6e194d2781f06d8a483ae410bc222bb888dc759e79b78d14f037785d5d1a66975d5364d1d173dbf8bc24490504b20984c895fb86194d5

                                • C:\Windows\{341C338F-DC1A-4f82-A4CE-045FAF61E0C8}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  ac5c333dbd5aa8a9ac8cbea614b2e76b

                                  SHA1

                                  0d7a40b1266fbd0333aab2a328c4005210cb0809

                                  SHA256

                                  d2d4578071931d706773521c445924a782d9ad41ed281929f0e51c60178c0b9b

                                  SHA512

                                  9da93d541bd45d6f72e365de913e0aac76bb749ab53b77f5672e8b503c7f22d9374ca212a207bb32ef4121e02be9e21d1f2bb743dc1aa829d2cf33bf68cbfe2e

                                • C:\Windows\{45471AC6-F5BF-4aac-AD94-0A84A402BB31}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  5644a3d30096e6459b038b2e7b7b3469

                                  SHA1

                                  9185c284d9310e2cf1bf368799f9c1189361396f

                                  SHA256

                                  752661f7c51f322245c7b759720bc15597af6a96e369374d725206ce9ba72ab4

                                  SHA512

                                  deaedd4f167d3c29ba9827443924ebd7818a9543237096a5b0a396610ddbbc262fd600d1a1ec43f852cffb6c75cf49cf9f046604d533e0eb705bf2df04492c8e

                                • C:\Windows\{45A8FEB1-5827-4b8e-BC7D-8387F5D0B312}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  9d39a27ddf3144c178dd8d8a67f60053

                                  SHA1

                                  35c603c37690623be6c8847c1efc3c76bcdafb2e

                                  SHA256

                                  d038a527ba9f7be7b69a27937cdfe7aaf51e93c2031a86725d2149fcef15a93b

                                  SHA512

                                  d5c7d397c87d65fd13bf1c2ec7088650e72670ab196c211007254b4d0990861524e7f30dc6857fda31fe9378bbb6ef5274b55884ca0120ef0d6bf60cf2210aba

                                • C:\Windows\{71A7D6BA-BE68-47e1-8CB5-E96CF4D4CF8E}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  ddb43779756d7533baecb73475e19168

                                  SHA1

                                  e25f1ace6c8c10629471dbe0279dbf19bbb7cd5f

                                  SHA256

                                  0e41bec3cd35b37e02b04a187ce5597b4da3f7cb0862b29ec98bc39a4023a8e0

                                  SHA512

                                  ec61e01dd3d83f7e69fd0db561b70ce7d31ab8a1f5cb779cd7737f816534e96abdf65e262371c86c66e5ae99c3edb390199e43de1b892a21e967908672e6a8ed

                                • C:\Windows\{7431CD1C-C50C-497b-BB1C-EC514798915A}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  84158088293099018e0161f763aaec63

                                  SHA1

                                  2c333feff9174d895f6bff274444b6600121b9dd

                                  SHA256

                                  309f2b72046f6ca835f4e265a0bacdc499397a6a66d809cc0c5d6d8f0c1f08fe

                                  SHA512

                                  524de4b136a63097d4a282431fb341c2229ea3a34a628daed47b7b944a02d5b118d2e2042a72a623398351b0b836e1f132258d6241143b4ab36d489f0b7ba4b0

                                • C:\Windows\{A96EE9D4-13E0-46af-B857-8073505919CC}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  25a6af10c0a0a9e8224e0a2e2f573d9a

                                  SHA1

                                  45225eb131fc0815a156098666d2660cabe7f46b

                                  SHA256

                                  314bfd60ac5c92202008617efaa914a92ed2111bccd9d4e87388d894f6ade884

                                  SHA512

                                  03c5b91cfd85ee3ddbd50e8711f9834c9cb05c694fb3b78b7a6ec138959f47a5c3a13ee62ca81411fbf9770716b824d1ab9896ec2d52dc1fa478f0c791fcdf9e

                                • C:\Windows\{A96EE9D4-13E0-46af-B857-8073505919CC}.exe

                                  Filesize

                                  249KB

                                  MD5

                                  455b43eefaef2066ea141ec902d554e4

                                  SHA1

                                  1737785ec0fb73576ad6b9cd0843cae08b41a7a1

                                  SHA256

                                  05ae38cfb1f4da2f652fe185c246fde9d8339d0cc53a47b6b37c3b4476d9302d

                                  SHA512

                                  f4278e2e7c2fbb0e34f712ee4f8b81f38d86802403cdd79f5451805298935287996ca4a28e993e350ad68059e54e85e6dc0e92f646ad523d90cd631cd6cfe762

                                • C:\Windows\{AE6A511A-DAA7-4ee5-9A73-A57E46863F66}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  e3cf852e9f95ad812c745737a975c7f0

                                  SHA1

                                  1e1e4aad86274f316691b05401fcc8b09cd73b0b

                                  SHA256

                                  21e33760be28788d730d8fcb2f9b0f47b84b0bb3ad94f56a66674be7505c487b

                                  SHA512

                                  64b5db0769bff7371663475aa97c6c6fa09230001df16402eb152141bc07b79911d2c06edd05e2f58cbf1658cb9a8e0d41e1bec3d98db620b3e36c5db42fee5f

                                • C:\Windows\{AEEF3768-96B5-445a-90BA-9BAEE606E112}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  5bc4d3e228b758b33ffe02dbafe6bd6a

                                  SHA1

                                  3e87811fe49c364b800af5a2cf2f51edd0607641

                                  SHA256

                                  c3b55de9504b7a34463995d429d1969a59d4c26158490e7cb4c6011b6df377b9

                                  SHA512

                                  a312ee97757b33acb6711bb2ecaefd084890f8e38ba9ec01dc8b77127178f6dc82694b1292014870c88edd2d5041ae70f5256fd5acd4bf1a6a526f6d501198ba

                                • C:\Windows\{BF210C2F-DF8A-462a-A41A-D52C2E0C90B1}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  2284a764dbb2db92202f1be218776a1b

                                  SHA1

                                  1a69b6ec72eeeb907e79e56b00a9dad1c005bf3c

                                  SHA256

                                  c49b399aad30729f9cf49ef602e02460d281771503b321f41314fca2fbb1cafe

                                  SHA512

                                  7fda1cf965a777f3bcf98a8fa6f7b1737bcff86452e23ed31582cd635bf9567c038988bd335f5126101969e1b4ab7e66f2dc91089930754be0391d5131da0db1

                                • C:\Windows\{DB9B3276-E494-4b5f-BFF6-DFC35D9452E0}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  19c8b1b12664122337871f277f204fdf

                                  SHA1

                                  df3d5a49b1a163b60c48a5620c03af5e48058e7b

                                  SHA256

                                  539c9404b8ec126a187f451a29716341d2d9eaa844e6ab7076886228e86bfa10

                                  SHA512

                                  f42a70b15d0475c94ba3f113639b744c4771a45f379d8a5332b2464031c00282f7e1ecea64dbec682a6dee8d892d4f4221494faa7cf4b23951c960848667f674