Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 01:00

General

  • Target

    2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe

  • Size

    344KB

  • MD5

    e8e30d11b3770e6704888e4b5ddf8115

  • SHA1

    98775ad34e4e47c84766859ca53020120130af02

  • SHA256

    9e3b86279c8c2a84675646e21d94d1b99d6610b368c199abdc37fc13d0e21fee

  • SHA512

    6268252e6a76a5305c291a4b3f50e94af0e9a8272140dcf227826f8da22740b616f22b4f1f2087cd01845ae9e882baf542c4b78788e9a8733abfaa50a56766f7

  • SSDEEP

    3072:mEGh0oolEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGalqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_e8e30d11b3770e6704888e4b5ddf8115_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe
      C:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{68E32~1.EXE > nul
        3⤵
          PID:1280
        • C:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe
          C:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2420
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{C0C57~1.EXE > nul
            4⤵
              PID:2744
            • C:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe
              C:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2812
              • C:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe
                C:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2704
                • C:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe
                  C:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2136
                  • C:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe
                    C:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1756
                    • C:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe
                      C:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:768
                      • C:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe
                        C:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2580
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{65C5A~1.EXE > nul
                          10⤵
                            PID:2932
                          • C:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe
                            C:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2776
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{41DC2~1.EXE > nul
                              11⤵
                                PID:2148
                              • C:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe
                                C:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2688
                                • C:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe
                                  C:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe
                                  12⤵
                                  • Executes dropped EXE
                                  PID:556
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B912A~1.EXE > nul
                                  12⤵
                                    PID:1352
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{BDE37~1.EXE > nul
                              9⤵
                                PID:2924
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{231A0~1.EXE > nul
                              8⤵
                                PID:2472
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{34517~1.EXE > nul
                              7⤵
                                PID:1664
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{47C4D~1.EXE > nul
                              6⤵
                                PID:1876
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{EA644~1.EXE > nul
                              5⤵
                                PID:2588
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2104

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{231A0106-DFEA-40c9-9EBE-C1F0E4CCF444}.exe

                        Filesize

                        344KB

                        MD5

                        7d29d1ad14627e9ee6e2152254fcda68

                        SHA1

                        376381d5d26fc9976692ab9e13dfc04bd425b75c

                        SHA256

                        9e407493b5d326242109b48603882e59402aef6a64a7201ba46a578ad5472953

                        SHA512

                        fee7e6ee4e079a4aa62bb0ed774ae025171c6462e9d3d2b62eee54e7272d7f78e07ac2a433ee1981e035f6fdeb1ad34340f6ac46a27c9eb9e070a73b1e577fd6

                      • C:\Windows\{3451706C-208E-4f7c-8A13-5A54E688E983}.exe

                        Filesize

                        344KB

                        MD5

                        fe8407f4ea2c7a3f9adf58e76c9eb5f1

                        SHA1

                        14b4ffb359b7b30d3bec64a60f8e368eb961eb9e

                        SHA256

                        a09189a7c12a683fba2ac8cad31930d31bb156222cae0a4aba945e4097ded5f6

                        SHA512

                        f09e0bfd426a496429c19826ff95378fc5f89c36c0cd9a5c07bff3fe97afef3dcb409bbbd73637d20a7c8cfa1966b447af06fea5c3464b5cb54e8a41922c832f

                      • C:\Windows\{41DC206B-9943-4485-9F5D-E8DD60B6B509}.exe

                        Filesize

                        344KB

                        MD5

                        59089d8940209969b2bd403f125fc430

                        SHA1

                        427a37b7143d502b55e95ed2727eba965a292608

                        SHA256

                        22077899c6a2b609719dc2edc53f05ed76eea197443357c9b8de09eaa752b40f

                        SHA512

                        30000043a5e41cbee9c4cf9daee7aa99a7b09ff22b0baaa5638f47b01462e4533c7ee244f546080334617e50b4fcb1ba7af0f27dc2dabaeaa4fb5be23c4d5b97

                      • C:\Windows\{47C4DBE2-986E-4efa-805C-B24ADDC9D958}.exe

                        Filesize

                        344KB

                        MD5

                        2de2d324123604eea32e146c414de300

                        SHA1

                        0597bdf057916ade86bb4ac1098988f65476f1ff

                        SHA256

                        a93e09fdfee53a7f854a75815a966a86c179790e4cc285d36057b891c03d2199

                        SHA512

                        aa76004e5c6063f6b4567637e5b400b5a4be646ec8b089d8be081e2458054e15a2930bcd7a859588c791fc35b1c800037b336c9c571b0b97ff530306e0e02337

                      • C:\Windows\{65C5A1B6-751E-4dce-B6D6-7B4DE3C2BF37}.exe

                        Filesize

                        344KB

                        MD5

                        0eaf0e4d9d63c69641f5314bdcd0f3e3

                        SHA1

                        af5998f74f8903a2658df011450623bcfa8bd53a

                        SHA256

                        6c9cf6691475dbc79e7ed1bb74b8a0ac45eb42efa68b9469a9527abd468f3d3f

                        SHA512

                        4601adbef46369d72d25fc7be9dbd012614dfc465fadd6f087c40bd8576c6647241750cc9373c4f00a8432e8790cb94dc6375aaf8f8bbd31b26039c282f5e13c

                      • C:\Windows\{68E32B28-49CA-47c7-88F7-20737AA86A77}.exe

                        Filesize

                        344KB

                        MD5

                        ebf2b4025189346ec537de5cbf923084

                        SHA1

                        7a120928c5badf1f7edb7f20dd92a9f3a4351e22

                        SHA256

                        bf8f0007d8a28484bab79b5a963ce90777565b97090986635efc83c4ea6d9319

                        SHA512

                        c4176355289781d9911a7d9cd802933c77a81848e67e19fe06cffd0a5d46a178999e858b267444b902ce7e1706927b0e151c9b0a5040489e32b021ea99e8cc41

                      • C:\Windows\{B912A057-4374-475c-BEEA-51A9C2C2CC88}.exe

                        Filesize

                        344KB

                        MD5

                        03309cab5f88b927286fc9f8ff0afa2a

                        SHA1

                        bb19262852b23634c5b3f052eeafdf3c581c007e

                        SHA256

                        b28ea95bcb2086bd8164137531474a22c353d0e5b770eb81372e473e9471c2ef

                        SHA512

                        2722c1182aabac6964c700d194e051d2cea724761e5850dfbbab5da8b0a2d71820c89bb41a507c845eb1198d45af9bc217a7dd87d99b25ac932b07bdde2dbbfb

                      • C:\Windows\{B9EB5620-0885-4af3-BEE9-2FA01202E44C}.exe

                        Filesize

                        344KB

                        MD5

                        50a018658789bc906be9dd2db3494b2d

                        SHA1

                        d31ba08135b3649e0b0919c7b0ef8a234c5966b9

                        SHA256

                        5e6b1a08538213d23bee8db57641bb08d11be1d250831198b1604e5f42af81b0

                        SHA512

                        348b9651a4e4dbd107b41531325a527acc47bf68375cd29432f061af35eb3ec6bd2e480fc4e2906a9f694a794ab550cd1f7bef386405d24b56a948645b775bb3

                      • C:\Windows\{BDE37791-2513-43e9-8D7B-BEB8F2F1B59F}.exe

                        Filesize

                        344KB

                        MD5

                        708442a4994b7f2d87965bffcd9ce37e

                        SHA1

                        295eaae48219e1e7185b0ef9023633f7b0962d45

                        SHA256

                        8881a0d8e5444ab7415c9ad543cd1e87dd103f31360659174b933bcb71c8ba71

                        SHA512

                        c20c266b8f517b1cd78593d040a0124fc9cb8f2baf88267373613dac3a56f970e0bea48c3393591d1718e33434c93f1a30f6c38c6db0f4fe8e425b7201c3ea41

                      • C:\Windows\{C0C575C9-5307-43b6-802A-E7185C1F7B52}.exe

                        Filesize

                        344KB

                        MD5

                        ce7261b825fe3ecb9cbb60fa3b07fad0

                        SHA1

                        2c0e1c75ed509f082168a0595963dd5999433800

                        SHA256

                        987dab23b8f62b6cc2a0f38aabfbef53eae0497962425f615f6493f3f638d0c6

                        SHA512

                        a9077b796273aea262e86cb4b6dc9b58e1b375bb8157f113c56776dfa50916879b38857d583cab4370c236719c010041ae04485641fb7f4438aeb329ae1b44cc

                      • C:\Windows\{EA644BCA-138D-4aae-A994-6247EBC152C8}.exe

                        Filesize

                        344KB

                        MD5

                        ab3b0f5d0aa65905f74823bf9656f3d4

                        SHA1

                        00529a24cb812c919bebac04106635822b2f3ca1

                        SHA256

                        135006e2f3ac75a1523f5cab29ce20cf10fe4e6c12c519b4810350f04c4231d0

                        SHA512

                        40e7d5815aa9b412df1edfe8156f9d29951b21cb2b74f3b3947611736b2e7e21a8ff2ce700437b6dea33b9b1c1be6383af5e4183ce44406b48aa412c98ecbb71