Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 19:46

General

  • Target

    2024-02-18_4390c88d3c74d38f2fd37d6aad54324c_goldeneye.exe

  • Size

    168KB

  • MD5

    4390c88d3c74d38f2fd37d6aad54324c

  • SHA1

    57ec83b48e4bf563e118679cc16fcb4c9f56c171

  • SHA256

    b50b6c9a49abfde0abee2c361d476f5fa1b44e94fd3a4c33e7b84538e595a2ae

  • SHA512

    7f07e8184e1340e057279c305c7a8576c676c1b816ef5b24647171f72e5662f5cf8d4ff1c74ad06232d9efbc4b6a03470925924946fe272f04b100ece8706cf7

  • SSDEEP

    1536:1EGh0oRlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oRlqOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_4390c88d3c74d38f2fd37d6aad54324c_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_4390c88d3c74d38f2fd37d6aad54324c_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\{EEE85776-6206-44a4-9FA2-C8A9484167E0}.exe
      C:\Windows\{EEE85776-6206-44a4-9FA2-C8A9484167E0}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\{FB7796DB-F152-4d0e-A56F-98D628F9AA81}.exe
        C:\Windows\{FB7796DB-F152-4d0e-A56F-98D628F9AA81}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\{DDD703C1-F9E0-4139-A46D-2E3F224D9909}.exe
          C:\Windows\{DDD703C1-F9E0-4139-A46D-2E3F224D9909}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2816
          • C:\Windows\{37241E51-4D10-4992-90F4-B96488C386EB}.exe
            C:\Windows\{37241E51-4D10-4992-90F4-B96488C386EB}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{37241~1.EXE > nul
              6⤵
                PID:792
              • C:\Windows\{DEBDFA32-8852-40cc-8923-00833D82BF8F}.exe
                C:\Windows\{DEBDFA32-8852-40cc-8923-00833D82BF8F}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1168
                • C:\Windows\{2A084471-3C61-4727-986B-F3EA3193A168}.exe
                  C:\Windows\{2A084471-3C61-4727-986B-F3EA3193A168}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:796
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{2A084~1.EXE > nul
                    8⤵
                      PID:1288
                    • C:\Windows\{E56972B1-B7D1-4a5a-971E-A2CF8000DA39}.exe
                      C:\Windows\{E56972B1-B7D1-4a5a-971E-A2CF8000DA39}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2312
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{E5697~1.EXE > nul
                        9⤵
                          PID:1516
                        • C:\Windows\{BFA3707A-55E7-4ff0-8589-74364A2E3F12}.exe
                          C:\Windows\{BFA3707A-55E7-4ff0-8589-74364A2E3F12}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2892
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BFA37~1.EXE > nul
                            10⤵
                              PID:2692
                            • C:\Windows\{2452F5FE-0854-4636-B9F7-3F5E88D191D3}.exe
                              C:\Windows\{2452F5FE-0854-4636-B9F7-3F5E88D191D3}.exe
                              10⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2948
                              • C:\Windows\{58AF2B1C-2ECA-4e3b-A452-F152EA20F7DD}.exe
                                C:\Windows\{58AF2B1C-2ECA-4e3b-A452-F152EA20F7DD}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2236
                                • C:\Windows\{EB6F393E-DB7A-4913-BAFE-ED36B7215811}.exe
                                  C:\Windows\{EB6F393E-DB7A-4913-BAFE-ED36B7215811}.exe
                                  12⤵
                                  • Executes dropped EXE
                                  PID:556
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{58AF2~1.EXE > nul
                                  12⤵
                                    PID:1352
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{2452F~1.EXE > nul
                                  11⤵
                                    PID:3000
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DEBDF~1.EXE > nul
                            7⤵
                              PID:620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DDD70~1.EXE > nul
                          5⤵
                            PID:2604
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FB779~1.EXE > nul
                          4⤵
                            PID:2748
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EEE85~1.EXE > nul
                          3⤵
                            PID:2444
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:1264

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{2452F5FE-0854-4636-B9F7-3F5E88D191D3}.exe

                          Filesize

                          168KB

                          MD5

                          034e1274aa4bcade0e54a0eadd29bc86

                          SHA1

                          858caad94f1e290373e6b9867f980e1be43b449d

                          SHA256

                          1215f298b669ea2ca7cb29a35f905903ecbe8fa1e1ea26d018384beeefac9959

                          SHA512

                          9a7efeff86ee0ea8b243f421013f48c4a3220de3b01506f44abd1ae42285cf9b7cd0f3eada0f5ef6b80f2a2b4017b5bee7f91ed568df6263090787a1af315287

                        • C:\Windows\{2A084471-3C61-4727-986B-F3EA3193A168}.exe

                          Filesize

                          168KB

                          MD5

                          010ffd73f03e733aeecac4b27eb073ea

                          SHA1

                          ba77b957effa8f9c89a33dae80dd63b92b76c136

                          SHA256

                          cd66e83a21253d191533a4acbc912176ac584cb164d0a7353ccc53330bf92da7

                          SHA512

                          89982e2f50c57cb019f36f45e5b9b43cab0944db917976cb1cf8493af562632566165e70f7556567ec6c04b194872918797d9de0818a9643a33ef714fa2a7813

                        • C:\Windows\{37241E51-4D10-4992-90F4-B96488C386EB}.exe

                          Filesize

                          168KB

                          MD5

                          49492905da529fc49f51f034dafebd79

                          SHA1

                          16b5041b82c37cc281bb97a549ea73aa6bc094c5

                          SHA256

                          4ae3445b5f92e5545b4916f098e389965376efe19670f3ecf35fe853038dc637

                          SHA512

                          aabb10094032cb0f8c8ae5a88f30662400e6861b9db31774be9a428ed4a5a3e31f09d9287607b2a3ead9d7799a89328cf53dd9856671ba94f09182a6931190a5

                        • C:\Windows\{58AF2B1C-2ECA-4e3b-A452-F152EA20F7DD}.exe

                          Filesize

                          168KB

                          MD5

                          f4ed4e743f28b99e1402a888c678e2ee

                          SHA1

                          901e9b4e16f41a2ea45e26a9b5294a7685df9d8d

                          SHA256

                          6fef0f943645dbfb6e4c24e50edc5f00a3fb51791a54ca60160df96fb151a495

                          SHA512

                          a4502d13e813a00942fab3bb45f65f7bb3d49eac0d9e5530283599f8112d759c4d78bc4b6922ef722358925dcc495ea807b0ea55d535af3f60082734fc30652f

                        • C:\Windows\{BFA3707A-55E7-4ff0-8589-74364A2E3F12}.exe

                          Filesize

                          168KB

                          MD5

                          6179b1574963b260b8bececcfd2b280a

                          SHA1

                          0be547e31c072c8e6dd5e28982af9c9bf0bf8f1c

                          SHA256

                          78d381e24b13cbfdd576554dd23b5a8f4997a46d32dd528b9bffdf4e87b0478b

                          SHA512

                          f772d1446d0523aadd2e4ba0af1817f60962309d45dc03ad3f31e3a17cc6bd4f1f8902fa01c5d7e3dfffd9d12b5587a786a687607ad7d639d22a2a0e2d776176

                        • C:\Windows\{DDD703C1-F9E0-4139-A46D-2E3F224D9909}.exe

                          Filesize

                          168KB

                          MD5

                          73126d0923fe858559e1306fd6ba3cc0

                          SHA1

                          3605914abf3bf386cd85938e1b6d4365821ec446

                          SHA256

                          946b81cd56504a28cc5d0ae5d53ab6f223dcc461f5907a2cd78c00d19dec068a

                          SHA512

                          ebdfa7184b8768436fd9416a4dc80b87d0d70f8989b6b4121adfc71c1f77a0ef4e9a940cc816b2a9698febc81e15e30056d5caff279e31e06cf692b251025a76

                        • C:\Windows\{DEBDFA32-8852-40cc-8923-00833D82BF8F}.exe

                          Filesize

                          168KB

                          MD5

                          f4377d1a06685cf5557c21527e0b8898

                          SHA1

                          878294e0b5f03c19832366881e2d09c004dc3a53

                          SHA256

                          28b3a4f75a5c93c08dc90968a484bf2c2daeadc227c28d5741ad8d644360e0a1

                          SHA512

                          9d7d87a36e19dda18608877e0157d08b779412eff5d4cb633803df4b3d7da7363c3892cf6464d9ce6549e1b9613a443f71b965b57b8251950c3e38cc95b47130

                        • C:\Windows\{E56972B1-B7D1-4a5a-971E-A2CF8000DA39}.exe

                          Filesize

                          168KB

                          MD5

                          a70fafe91af192641ccbb8e387dfc6c7

                          SHA1

                          59cafc960345b7a2d6e4144748becdef2ece2cad

                          SHA256

                          508bbffc0430933efa98d346e7f7d37bfc367a7af9c78f27c12878fc567e166f

                          SHA512

                          19cf69434e2efa4e84c290604bcce167a7fe139425d2593931b187a102ea51fb6bb1d46509ba1eaef44ad1ab3508ca73352336309a4c81d3dd7b56df24fd85af

                        • C:\Windows\{EB6F393E-DB7A-4913-BAFE-ED36B7215811}.exe

                          Filesize

                          168KB

                          MD5

                          c11527a132ac6d9670adb9b426ca9314

                          SHA1

                          c952df47028fa99a149ff477590028b299f703ca

                          SHA256

                          e1d3ab2ddeb4032e279b4cf34983277887efcc4d6c97dbd8d1cacfdfc53b8726

                          SHA512

                          d07e5a4703fdb9dcce61dae8ec535b1d60096adbae0726141ed801fc7ede9211147c101a00807431f0f1adb621c383538f27a57dffb5d31257b64e79f602222c

                        • C:\Windows\{EEE85776-6206-44a4-9FA2-C8A9484167E0}.exe

                          Filesize

                          168KB

                          MD5

                          7ecf999e8dbfdf8e30b4d8af79861369

                          SHA1

                          c44b31d2e5954538a09e7f28a80d337bb4c42095

                          SHA256

                          0887a1c89915f64a65c58fd9e7a60f46ac268df6732f0df5c34ca974df00ec53

                          SHA512

                          9e3aa3a6eb29dc4cb3f21b11f27c114a6c0927ca296c7a51ae829cac41114aca63be8ce3f12a5162ff42e3c1f1ad8fafde78f7f2afbd328e4d7778b18b8d938c

                        • C:\Windows\{FB7796DB-F152-4d0e-A56F-98D628F9AA81}.exe

                          Filesize

                          168KB

                          MD5

                          3e732dca42dd6b3fb82d2f9e822863b9

                          SHA1

                          9bfd8f1e34ae03f3e85bd7dae5ea5bbf6927dafe

                          SHA256

                          565f6883b9c5f86da77393887ffb8999a88e4d9eb4563272ce7986348a4bc384

                          SHA512

                          2bfcc038cae6567ea8d707a2510e444b44cc7a9c25db699647fa4902a12e532e85553a498b8fc60b5382162f63c83d2184cd59f87d3bfb65ed2931bd4dc0eeee