Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 20:32 UTC

General

  • Target

    2024-02-12_c5557a9afbd4214c779ff467d044e4ed_goldeneye.exe

  • Size

    408KB

  • MD5

    c5557a9afbd4214c779ff467d044e4ed

  • SHA1

    29efb0b393c83188c3d93c25fee37333cd5b6754

  • SHA256

    0ed04466b3c358a575506f48d8e3e7a0e1ca0e10fe542e336b66d025d91838ad

  • SHA512

    a8e9c27af48b5b5d423388d59f9f32252da51815da2aae4ed7068330a09943fc039524dd4393842c79e13e91cfee1064d9b09c50d3734116ecc9b5d8d1e6aae7

  • SSDEEP

    3072:CEGh0oil3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGQldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-12_c5557a9afbd4214c779ff467d044e4ed_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-12_c5557a9afbd4214c779ff467d044e4ed_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\{FFDBAA9A-B1EE-4c82-A1A7-C9972BB7ECF7}.exe
      C:\Windows\{FFDBAA9A-B1EE-4c82-A1A7-C9972BB7ECF7}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\{75526C1D-8721-4f93-9032-6355234FA448}.exe
        C:\Windows\{75526C1D-8721-4f93-9032-6355234FA448}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\{23ED44EF-F24B-4e6b-8540-E784A85888A1}.exe
          C:\Windows\{23ED44EF-F24B-4e6b-8540-E784A85888A1}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\{C8E474A0-4A56-4af9-91CA-519FC052DB60}.exe
            C:\Windows\{C8E474A0-4A56-4af9-91CA-519FC052DB60}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1940
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{C8E47~1.EXE > nul
              6⤵
                PID:312
              • C:\Windows\{CD952FE6-BD1B-4a20-A536-EF491BE97694}.exe
                C:\Windows\{CD952FE6-BD1B-4a20-A536-EF491BE97694}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2972
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{CD952~1.EXE > nul
                  7⤵
                    PID:1640
                  • C:\Windows\{46DC1D40-9B58-4762-939C-07F43F68F144}.exe
                    C:\Windows\{46DC1D40-9B58-4762-939C-07F43F68F144}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2272
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{46DC1~1.EXE > nul
                      8⤵
                        PID:1276
                      • C:\Windows\{408B3FEC-BE23-499f-9D1F-07B02E02CE7B}.exe
                        C:\Windows\{408B3FEC-BE23-499f-9D1F-07B02E02CE7B}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1772
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{408B3~1.EXE > nul
                          9⤵
                            PID:1244
                          • C:\Windows\{D9025C02-CDD7-49ad-A80D-FB63FED8075D}.exe
                            C:\Windows\{D9025C02-CDD7-49ad-A80D-FB63FED8075D}.exe
                            9⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1208
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{D9025~1.EXE > nul
                              10⤵
                                PID:2132
                              • C:\Windows\{4004A33A-3769-48ca-A847-AB76859B9E87}.exe
                                C:\Windows\{4004A33A-3769-48ca-A847-AB76859B9E87}.exe
                                10⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2592
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{4004A~1.EXE > nul
                                  11⤵
                                    PID:568
                                  • C:\Windows\{74C9A91C-5497-4021-8893-83E75021FE32}.exe
                                    C:\Windows\{74C9A91C-5497-4021-8893-83E75021FE32}.exe
                                    11⤵
                                    • Modifies Installed Components in the registry
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:268
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{74C9A~1.EXE > nul
                                      12⤵
                                        PID:2412
                                      • C:\Windows\{FE92FC74-C6AE-44ed-9FB7-25BA76E7E6F8}.exe
                                        C:\Windows\{FE92FC74-C6AE-44ed-9FB7-25BA76E7E6F8}.exe
                                        12⤵
                                        • Executes dropped EXE
                                        PID:1660
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{23ED4~1.EXE > nul
                          5⤵
                            PID:2844
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{75526~1.EXE > nul
                          4⤵
                            PID:2780
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FFDBA~1.EXE > nul
                          3⤵
                            PID:2140
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2748

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{23ED44EF-F24B-4e6b-8540-E784A85888A1}.exe

                        Filesize

                        408KB

                        MD5

                        61e8bb9139963b61bb4d7798d74afdff

                        SHA1

                        e42e256d662c78cbad53ca9fb0ffe10601c0ecf4

                        SHA256

                        7091f970cb6e4010d6f5da9ec6eed48a05be09b3b22ed47ca9ff0a8ecbe4bd4f

                        SHA512

                        7c8c73ca0f0ea72f8581ee34f89c32c8899979992befd39e026c13a9ebeb3da25e2bcdfa00f2c7fec27e03688b0dac5ffc348120dc4bc27cd1d15dae124e3276

                      • C:\Windows\{4004A33A-3769-48ca-A847-AB76859B9E87}.exe

                        Filesize

                        408KB

                        MD5

                        53a614e5225bc2ea9747b21f64fa7fb7

                        SHA1

                        fc0daa31da5eedcfd4cfc953c2a20c359bd08f24

                        SHA256

                        686cfb2a530fca65e41cd619985d8f0b0fc79efbf9c3d5a8331ad62994834fac

                        SHA512

                        68a7e83a5156b4bee78c9efa5eefbe8d62cbc65bb290ebddec87e6cbd85cfd7732118b1a682ecf1c6a17ea3ab8206c17c8f2e598942e1c6024c6553f40a48046

                      • C:\Windows\{408B3FEC-BE23-499f-9D1F-07B02E02CE7B}.exe

                        Filesize

                        408KB

                        MD5

                        fec7343c7aa3ae414ccdc02e20a8ea89

                        SHA1

                        9b4213d9e08b43375f734323e04129a15cf1ae95

                        SHA256

                        4b6bfc5f491229ffdf3764683a187dc66fc34088f3f372f2db9a6599985792f7

                        SHA512

                        bb51bff15f77b84ace74741ac4c22b548a7ee7cfa779afb24ddb1d28a13833d010dcc2325bc8819e49ce23406b96358cf3aa66c28967496b7a2b51ed2c3691b2

                      • C:\Windows\{46DC1D40-9B58-4762-939C-07F43F68F144}.exe

                        Filesize

                        408KB

                        MD5

                        2e8f66355132a208de8107111db7cff2

                        SHA1

                        4ba9f97e56d9795567694757bc5f70aa737c7890

                        SHA256

                        7d35ad649fab7eafd3edf87bb4891ca84a4d69a6e4dc3966acdfaa148496e4fe

                        SHA512

                        d9339379060064263660686c0b1a9b94dedd5e8e365cbf5995d1f4f1cc6ab078a25728549ad08410d2f5c69825478d509714a97a83074d03c72e552144e038df

                      • C:\Windows\{74C9A91C-5497-4021-8893-83E75021FE32}.exe

                        Filesize

                        408KB

                        MD5

                        db3cbed4caec0ff5f0a3f40a57a4bdfb

                        SHA1

                        8edfd0a0210852104a18c304cc2d41bc1f143eeb

                        SHA256

                        dc9ecb630de5d084d1c3e32a900fd78df0f200f823e4bbc424f006c74143ba31

                        SHA512

                        6c755a039a54d249500c34f291a777178437e5fa5146a4dcd028df4161bd1377e6d149f234a53b03afd3660c95802a213192657a73c86713ad1e34ab73ee8065

                      • C:\Windows\{75526C1D-8721-4f93-9032-6355234FA448}.exe

                        Filesize

                        408KB

                        MD5

                        8eb34a3ad265dd8fd039de22e64d7c81

                        SHA1

                        2eede42cc6a70a0bdc3ba7235f279c4af8a4abfd

                        SHA256

                        e50c95e47300e1c2136634db7f69dbd74736b3ccc176d4a89876f449eb60f580

                        SHA512

                        369960f72e3b50d517c9021ed2ae7bfdb77d0cf28e33a50725eb487b6e8c0686252808d7ed11e9264f088b2b17ed503db128223a883e762bb1c3dcd0883d55ab

                      • C:\Windows\{C8E474A0-4A56-4af9-91CA-519FC052DB60}.exe

                        Filesize

                        408KB

                        MD5

                        80d6e4ec94d2e8cca6444c208015de0b

                        SHA1

                        389cc73e27206264dde3451331a80fb7a2c59951

                        SHA256

                        353fd03a007849451e3f04f2cc0d34dd846157aae659634f81bebbf0be3925ca

                        SHA512

                        37d69bbce45d7233d230a4cea3790bd21dbb8bd74e12771f05e05bf625ffa498cfb0fe233ffb517d51ccbcefe4bd714566a25fb3888ca1f194b8d932e3ce5a8a

                      • C:\Windows\{CD952FE6-BD1B-4a20-A536-EF491BE97694}.exe

                        Filesize

                        408KB

                        MD5

                        e84a6423f65bcdbbc3a2c17dcaf6bce0

                        SHA1

                        12746ac853a313e2c8b162c659713b5451214319

                        SHA256

                        2b00e5924733d6bbd92229cd7b1c6dc62a0bc9f3cbde510d948894468f5e0a69

                        SHA512

                        40024326fe8a04c9c44b8fee58c4a71597b97cc38030f1429afe92b49216afb771ba517694635d6e6291e47541e3141ba08216a62ab8e2dd23eca634922a512d

                      • C:\Windows\{D9025C02-CDD7-49ad-A80D-FB63FED8075D}.exe

                        Filesize

                        408KB

                        MD5

                        48ad38a9155ddd8ee9fb82251f166f87

                        SHA1

                        257efeb673c2ef9e5e30fb49318d7643aaa16207

                        SHA256

                        ecfc25b5b6b8aa2ef49b625d30df091db063cdde9e6d81eebba454233d868d06

                        SHA512

                        cb9b2136887bd6c11cf8c9286451c031b8df55007e52acb8f4a25ccacf6e37999f5d738e458cd9a39b33614219b050b84924580f7898fe861c7ab6520e759f24

                      • C:\Windows\{FE92FC74-C6AE-44ed-9FB7-25BA76E7E6F8}.exe

                        Filesize

                        408KB

                        MD5

                        70b09518730e2b77efdd3be6d84d011b

                        SHA1

                        07b1219b9231f9d15b0c2d38105d9534e252bef5

                        SHA256

                        942e5e6e96edd198346fe5ac618434a62a175525b1e56843030113a171e4dbe6

                        SHA512

                        7d5109156c3545f3de95f5b0daf845aac915a5393e8b0f7548dda569f49b7717109f77236aabf68a27fff2331fcbbfde71212f44b8dbc48e9a0b81519ef1f463

                      • C:\Windows\{FFDBAA9A-B1EE-4c82-A1A7-C9972BB7ECF7}.exe

                        Filesize

                        408KB

                        MD5

                        21234749aee7325e706773d995a76876

                        SHA1

                        a456dcaa3d2e69670f4efbd4606a46fcd1090488

                        SHA256

                        ba7f73da25a60ad87c60ceded40b633b9f0c062e5b96b2416b154560758e811b

                        SHA512

                        1947b0b6007aee927596050cf5f6cb8563151b8e6facb3e5eaea24eef6cb0c382496862847decc81a763afe53201aa8ffc9fe7bf04e63b296d0a125321cbdcb2

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.