Analysis

  • max time kernel
    152s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 00:45

General

  • Target

    2024-02-19_39b6973c17305ee207a537184fb4ecc3_goldeneye.exe

  • Size

    344KB

  • MD5

    39b6973c17305ee207a537184fb4ecc3

  • SHA1

    3cfb241701c8a796a27aedd26a1ce31a68d72c34

  • SHA256

    1fbf9700e4cbae3c46a310a11de24527a848b81500d98660c6bbf4dc388f7380

  • SHA512

    b3493e96a463cfa97434f97280fc2a96179fe6c4ca79f8efc42068968869d6d8f619e7da796f3a00ad947be766f691d50ab48af0c6ae8950a79c31dbf387111b

  • SSDEEP

    3072:mEGh0ovlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGNlqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_39b6973c17305ee207a537184fb4ecc3_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_39b6973c17305ee207a537184fb4ecc3_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\{98FFDCF6-4607-4e80-A790-195269537E30}.exe
      C:\Windows\{98FFDCF6-4607-4e80-A790-195269537E30}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\{C6467E9E-BAC4-44cb-AF29-A6C81053F905}.exe
        C:\Windows\{C6467E9E-BAC4-44cb-AF29-A6C81053F905}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\{0F20D262-48EA-48bc-9E5C-3CF3F39B7107}.exe
          C:\Windows\{0F20D262-48EA-48bc-9E5C-3CF3F39B7107}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2160
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{0F20D~1.EXE > nul
            5⤵
              PID:696
            • C:\Windows\{C1730FCC-8A84-4009-9D1E-6D123F1A991B}.exe
              C:\Windows\{C1730FCC-8A84-4009-9D1E-6D123F1A991B}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:600
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{C1730~1.EXE > nul
                6⤵
                  PID:3008
                • C:\Windows\{D830BD2D-B7AD-4ba9-843D-B387181F009A}.exe
                  C:\Windows\{D830BD2D-B7AD-4ba9-843D-B387181F009A}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2980
                  • C:\Windows\{E7FF4717-E31A-4731-84B4-AEA9F53FDADB}.exe
                    C:\Windows\{E7FF4717-E31A-4731-84B4-AEA9F53FDADB}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3004
                    • C:\Windows\{A30114CE-8A5C-4a3f-A9DD-28D3FF9034EC}.exe
                      C:\Windows\{A30114CE-8A5C-4a3f-A9DD-28D3FF9034EC}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1852
                      • C:\Windows\{8F392C5C-7356-4d59-A934-4DADDF991D62}.exe
                        C:\Windows\{8F392C5C-7356-4d59-A934-4DADDF991D62}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2804
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8F392~1.EXE > nul
                          10⤵
                            PID:1724
                          • C:\Windows\{C7ABB856-51F5-4d18-AC7B-92EC4CC86965}.exe
                            C:\Windows\{C7ABB856-51F5-4d18-AC7B-92EC4CC86965}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1744
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{C7ABB~1.EXE > nul
                              11⤵
                                PID:1332
                              • C:\Windows\{BC884E96-2F48-4a7a-BF50-E56113E5C3B4}.exe
                                C:\Windows\{BC884E96-2F48-4a7a-BF50-E56113E5C3B4}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1684
                                • C:\Windows\{C34691A6-8453-4951-8001-D438FF683989}.exe
                                  C:\Windows\{C34691A6-8453-4951-8001-D438FF683989}.exe
                                  12⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2028
                                  • C:\Windows\{66371C22-5897-4317-B273-F5C50BCDA9AF}.exe
                                    C:\Windows\{66371C22-5897-4317-B273-F5C50BCDA9AF}.exe
                                    13⤵
                                    • Executes dropped EXE
                                    PID:2412
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{C3469~1.EXE > nul
                                    13⤵
                                      PID:2128
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{BC884~1.EXE > nul
                                    12⤵
                                      PID:2356
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{A3011~1.EXE > nul
                                9⤵
                                  PID:1652
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{E7FF4~1.EXE > nul
                                8⤵
                                  PID:1304
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{D830B~1.EXE > nul
                                7⤵
                                  PID:1660
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C6467~1.EXE > nul
                            4⤵
                              PID:1924
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{98FFD~1.EXE > nul
                            3⤵
                              PID:2644
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                            • Deletes itself
                            PID:2744

                        Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{0F20D262-48EA-48bc-9E5C-3CF3F39B7107}.exe

                                Filesize

                                344KB

                                MD5

                                315a96b04fef4c95bb701a407daddf7c

                                SHA1

                                759fa3ec9170f2ec29d4e2fdceb483f9abe182da

                                SHA256

                                5b1462fe137edc8c3fb3e5c5007e27ad748a24db7e32fc39dbbb11da82f35923

                                SHA512

                                3c1e4a02395bc859fb86975ccf51ccc77bcfd133e7d93601077e83564b0c7ac0b1809156e3cc241a5c96509753a7e1728b3166db9cff732c1cd68e174d224943

                              • C:\Windows\{66371C22-5897-4317-B273-F5C50BCDA9AF}.exe

                                Filesize

                                344KB

                                MD5

                                11ff7afc05b01fdfd56839149f26fb9c

                                SHA1

                                b61802a2b66686594e68a03a11623cb931e2ccbf

                                SHA256

                                34d0ee29a9d1d3693194f782a69a3369df40b6160017e66df1d097cc6289eea7

                                SHA512

                                423baef5e506d2e1ed8948c49a294edc33d48b245e32ca85a1d65c967293f16c11ba1927f6cd30231189f78ebe91ddfc3854375d64c0b7e654f854a12fc314f4

                              • C:\Windows\{8F392C5C-7356-4d59-A934-4DADDF991D62}.exe

                                Filesize

                                344KB

                                MD5

                                cd852f042b99b3ff586865a151f8fbb6

                                SHA1

                                ce1a32609270af6ae80c27b36b5014367a0f642a

                                SHA256

                                f009dc2a60815e4ae7361fd5cf282be0222165c823f0c49c778f2c6032c831df

                                SHA512

                                29c50b8d0a3ce7621ecfbf1e2a8c3819682f5305c43ea537123c9d24bdb43e6101dfdcc58978f5a99de96251f932b9c0406fde66bedce35718d282ec90fc4b52

                              • C:\Windows\{98FFDCF6-4607-4e80-A790-195269537E30}.exe

                                Filesize

                                344KB

                                MD5

                                261168a1446390f108f1b8fd0ab8f515

                                SHA1

                                4d391189bf731b0abc0020f6dd16a6847a547c95

                                SHA256

                                eb6886517f5c3ea7e77671cf2ba013b5b7e7c7e7d4e5bea6477d9c3a05a2a552

                                SHA512

                                372f9f8246744215ec8b74ff04e934cbe1e342ad695bbc221f7d1a744a928a40d5f4c49f76ba484af5d24b669bd85e44bed1b66db004159f1a7f7f51c4ccddd6

                              • C:\Windows\{A30114CE-8A5C-4a3f-A9DD-28D3FF9034EC}.exe

                                Filesize

                                344KB

                                MD5

                                642f8e210886c6ef8a69e137434b5713

                                SHA1

                                00ca8385f75540ef9dbb83bd0beb26c13a2bf54f

                                SHA256

                                a07acbff3525cabcc980ddb13cac7f7ede2a32becfbed65aac9698ac039b19d8

                                SHA512

                                6bd74213aba81fa499403a2dcdf0d61f232cdb9dcfc605ca65c936af365d08466bd13413bdd579960414a03803113469e229e2af0046de6dfec0a615e221b12f

                              • C:\Windows\{BC884E96-2F48-4a7a-BF50-E56113E5C3B4}.exe

                                Filesize

                                344KB

                                MD5

                                4eb91032a9929263bb1ee37ca0ac196d

                                SHA1

                                106344f1f7777492e6b6579bbedb6631a9b3d298

                                SHA256

                                d7a26696d5b32ec4df736907e55110a365b14172830f6a3450a1f434e7ba44f3

                                SHA512

                                5136029d9e3b5c16ec0416c35594a93d64dc6f7052d4dd2c44b594f2e12faad08c81758bd74677cb1c030561eaffffdf27ec74913fa86dd29ac96f6433ecf428

                              • C:\Windows\{C1730FCC-8A84-4009-9D1E-6D123F1A991B}.exe

                                Filesize

                                344KB

                                MD5

                                ecd2610ee873b587172851429f3d9cbb

                                SHA1

                                7299f87ad6a3f9eeee2b9db389969bb293022f48

                                SHA256

                                c011ee746eee745fb9783c5046738fcafae918560774088eaa35ab190f4a6391

                                SHA512

                                9d46529eabe0eb82946b7c606e3c990050c9fff5046d3c3f5294b3453635bb8a105ac5b7874d5bd5542474bfdd11859979de7fab852c7ae1906c13dbd3cfc793

                              • C:\Windows\{C34691A6-8453-4951-8001-D438FF683989}.exe

                                Filesize

                                344KB

                                MD5

                                415c0fe3cb34fd364e608ef91b3e3b16

                                SHA1

                                ab5f3516acf6a4e4265437d148939ddbf6d6fa32

                                SHA256

                                74b0bafa5281c3a1f1d2e9b73d7f9e1ecc91276913c9c052b500d9711d0224c9

                                SHA512

                                07256d2726f12eb9e70cdb8807e0caec9b55e9d4237a344f3e3571b943087336bea5baa566d2286cc43fbcf356d87d5b115a1d92624f66cd45dd2bf6f2969bf2

                              • C:\Windows\{C6467E9E-BAC4-44cb-AF29-A6C81053F905}.exe

                                Filesize

                                344KB

                                MD5

                                0db810c84fa7d88534e8b2a2b5603c77

                                SHA1

                                cadb8659b0f661cb00c3c0e4a0c75015113c010b

                                SHA256

                                d4cc822cbb2aa90b0e9887fafdcb9b3a19fca56f4d3701666e8fcad5702bb498

                                SHA512

                                df680ed7516e58e7537b31f8b321e5af6512bfc04d6ff118f6a8b0f86cf76973c3f03548639c1a9246800eeddf181f7e357c1f4bc571572fd48d169b1868ef81

                              • C:\Windows\{C7ABB856-51F5-4d18-AC7B-92EC4CC86965}.exe

                                Filesize

                                344KB

                                MD5

                                5ba5143a560edf7884ed48bc41e23b32

                                SHA1

                                dacf964e2afd66e5aaa16116a230685fcc49c9ab

                                SHA256

                                eff4bc5ff771dccb901ffabfc6dc8d889be117b3404c1147145863ebfab399ee

                                SHA512

                                d3e6c46db00f4d165946f7553130f24e0b8ebc7d34ee0f2ac3f05eae236d320f5d7928f7b90c79b13f23e490eca231b83e868ed6ce6b6551b09d7176e54ef517

                              • C:\Windows\{D830BD2D-B7AD-4ba9-843D-B387181F009A}.exe

                                Filesize

                                344KB

                                MD5

                                c5b37ac30711c7dc71e0fc5d6a51a550

                                SHA1

                                bcb331fe470bd2b86a341f1820ec490d5c2180a6

                                SHA256

                                4d441dc12bab2bbb61e3c486db67cec314d12f74eaeaa31873173c930915eb9b

                                SHA512

                                bfd2ea2861dc42bb9f22e9efae349ba7188de47cf2f692776b4857fc6ca03cefbe16dfe35a4b190b34990aacde612d68240536d6b8b906e8f17e79acb6c1e184

                              • C:\Windows\{E7FF4717-E31A-4731-84B4-AEA9F53FDADB}.exe

                                Filesize

                                344KB

                                MD5

                                0c75d0d12db36a5229953f30c99aae9c

                                SHA1

                                b13deac14b453469a8543cf00930a96c1147dc18

                                SHA256

                                39f1d8ff8825fe8980eeee475b0cd973701cd51f33c3f8fc8bd45abf5c2ee215

                                SHA512

                                216656cc7c28c1714792d2ceb7da1844232053efba07db5f43e99f643d59b3f22ff8e2894c9794f81a23680da1d01a8a6e1dfd9f73e54bee72363d416c865eef