Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2024 10:38

General

  • Target

    2024-02-19_e32494cc6c4716c6f589d5eb5d2af5e8_goldeneye.exe

  • Size

    180KB

  • MD5

    e32494cc6c4716c6f589d5eb5d2af5e8

  • SHA1

    b29168da82f2fcb39d9b626e90db48fb6fa542b1

  • SHA256

    c58246660651d2c2a6f35d5c7e52282c5630cfe15635258e20467f251c7fe565

  • SHA512

    31abb9852224b36b03fcb9deff3b932c46e24cd6f6aa9fda545aaa101ca763efa5a4313aec09b6caf5fab283dc34e3d0acaac45b862baddd1590036d8c677db9

  • SSDEEP

    3072:jEGh0ollfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGzl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_e32494cc6c4716c6f589d5eb5d2af5e8_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_e32494cc6c4716c6f589d5eb5d2af5e8_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\{C76EBB1D-920E-4ff9-9C2D-67F33373C6AB}.exe
      C:\Windows\{C76EBB1D-920E-4ff9-9C2D-67F33373C6AB}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\{A2B0DF4A-59AD-42a5-859C-785013DD59DA}.exe
        C:\Windows\{A2B0DF4A-59AD-42a5-859C-785013DD59DA}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\{326BB197-3918-4e5d-88E7-B7728371E027}.exe
          C:\Windows\{326BB197-3918-4e5d-88E7-B7728371E027}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{326BB~1.EXE > nul
            5⤵
              PID:2932
            • C:\Windows\{1BD0BCC8-86A3-4e23-87AF-FD69D47EBA28}.exe
              C:\Windows\{1BD0BCC8-86A3-4e23-87AF-FD69D47EBA28}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{1BD0B~1.EXE > nul
                6⤵
                  PID:2668
                • C:\Windows\{1FF8E31E-3CB9-4a2c-85CB-203CBCD5BF4D}.exe
                  C:\Windows\{1FF8E31E-3CB9-4a2c-85CB-203CBCD5BF4D}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3000
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{1FF8E~1.EXE > nul
                    7⤵
                      PID:2480
                    • C:\Windows\{25EFB43B-14D2-4c8a-9951-41B13AAB1C76}.exe
                      C:\Windows\{25EFB43B-14D2-4c8a-9951-41B13AAB1C76}.exe
                      7⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2620
                      • C:\Windows\{03722CD0-B8E3-491a-8AF4-56B7644D0B2D}.exe
                        C:\Windows\{03722CD0-B8E3-491a-8AF4-56B7644D0B2D}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:672
                        • C:\Windows\{572EA52C-2E86-48c8-BACD-A80C14989ABD}.exe
                          C:\Windows\{572EA52C-2E86-48c8-BACD-A80C14989ABD}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2796
                          • C:\Windows\{229C7129-2BF8-47e7-91EA-A2947F8DC3E6}.exe
                            C:\Windows\{229C7129-2BF8-47e7-91EA-A2947F8DC3E6}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2100
                            • C:\Windows\{E67EB4A6-C428-4572-ACB2-350F02AE38FF}.exe
                              C:\Windows\{E67EB4A6-C428-4572-ACB2-350F02AE38FF}.exe
                              11⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2208
                              • C:\Windows\{D30A92E4-80F4-45c7-B97A-1F35FE5D7731}.exe
                                C:\Windows\{D30A92E4-80F4-45c7-B97A-1F35FE5D7731}.exe
                                12⤵
                                • Executes dropped EXE
                                PID:824
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{E67EB~1.EXE > nul
                                12⤵
                                  PID:792
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{229C7~1.EXE > nul
                                11⤵
                                  PID:2284
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{572EA~1.EXE > nul
                                10⤵
                                  PID:1708
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{03722~1.EXE > nul
                                9⤵
                                  PID:1648
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{25EFB~1.EXE > nul
                                8⤵
                                  PID:1056
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A2B0D~1.EXE > nul
                          4⤵
                            PID:2632
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C76EB~1.EXE > nul
                          3⤵
                            PID:2684
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2816

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{03722CD0-B8E3-491a-8AF4-56B7644D0B2D}.exe

                        Filesize

                        180KB

                        MD5

                        6d4c919aac744d68bce8e4d177e4ec63

                        SHA1

                        3303eda5f4e4edac8c3b5dbc1250626323e691e3

                        SHA256

                        3c464e0f7875d3ed9e42af83b8793bbd01bde36968059ce0d9ea1b1444c95a68

                        SHA512

                        8de93ce6a58177febca306926e46874f53e75318293dda9027f4a5bc4af46b86c29d392f40e685755f5bed0d1317c01f465b7ac1402c1835225e85776bcf35e1

                      • C:\Windows\{1BD0BCC8-86A3-4e23-87AF-FD69D47EBA28}.exe

                        Filesize

                        180KB

                        MD5

                        3db104d047cd576d761a577120b60cc9

                        SHA1

                        69508f787c19e0896d6d53d2fa3f8d117dd7df2e

                        SHA256

                        70d7e1d164540e478497e0a7f938811f32ee4133ebd172c348cfcac0a55f3208

                        SHA512

                        2dd7d142809842f623ba8c3955c09ca907f2dbc1588fb0dcd3b7d26eacf53f6c6f953891fc1094a2f743fa3d04485f24f090bfdee058a694dc4d425aa7f4ac44

                      • C:\Windows\{1FF8E31E-3CB9-4a2c-85CB-203CBCD5BF4D}.exe

                        Filesize

                        180KB

                        MD5

                        9bd9a93af794ce131f38b4d340bda13f

                        SHA1

                        e12d87859daf97a9a0097b2e293f8c7251210fc2

                        SHA256

                        478373c729f55b4d8311b2a465973a6f4320584e152b7828f6ffd8fee52fb2a2

                        SHA512

                        37f7cc71d043bc442fbcbd3947e5ba7641f2a30230eaa8e59856b10fd4cd0748d13e16b869156c62f96ca0adddd0ab5266b7c8a7d59babd6de1e0b4511a6125b

                      • C:\Windows\{229C7129-2BF8-47e7-91EA-A2947F8DC3E6}.exe

                        Filesize

                        180KB

                        MD5

                        08d03b327f3d1d97f19efd14f47f0c5c

                        SHA1

                        6b6dc0d78a1910abb546c1a5a353f0fc4e656ce9

                        SHA256

                        205fefb6a784a7838af5ec7db0aab525e2b08bad7c8bec1c8100f7caab8297c2

                        SHA512

                        31d5f4987eadd846e4e5a41fea99a87d25edb9dcf52aef1bdd5b75f7887426f977f7acd94fab122b257e6288887a4e58f5eac8c1c25d9732680503054f800bbb

                      • C:\Windows\{25EFB43B-14D2-4c8a-9951-41B13AAB1C76}.exe

                        Filesize

                        180KB

                        MD5

                        c4c98639ebeddd43a61a7946e8b5d986

                        SHA1

                        437807744ab0d54ebf824e8d86edd26d50519c17

                        SHA256

                        558cd54184f16cbf65018d720cb46ae85c1b03e7fb7aa14b2e0759d4221e88a1

                        SHA512

                        d07d8cdf0a8adeff70b99da4cbfb7604a518099c9845e5ade13702ba6b156e5c0f8ae0a457f6301062a87b9fb95953107ab1f4b711b18e611e3fd5164a7b6ebe

                      • C:\Windows\{326BB197-3918-4e5d-88E7-B7728371E027}.exe

                        Filesize

                        180KB

                        MD5

                        d85081c4bcabd51175c46ee863912ad3

                        SHA1

                        50594eab31a3c166c4255b6be27b20156eae6e53

                        SHA256

                        dfe91e3f88c0b3f8e291bd4773a827abe70b48b0005106c2be243f75367f4d89

                        SHA512

                        b6f47fae32b9c42a820aa3b208a471f469262b602163a8b4c49da08c9710f4b7f8fab9d5231ba73dd7e6aed6c7500d5c0cc8798a8123ba4e087e6978d4f52a68

                      • C:\Windows\{572EA52C-2E86-48c8-BACD-A80C14989ABD}.exe

                        Filesize

                        180KB

                        MD5

                        ea4e1601a7a05e3040e67796152cc8ad

                        SHA1

                        d48a31f4b9eabad5736fca8a0e33b02cce546ff5

                        SHA256

                        701453cfd36305bc1e7e4868dd07c6fca49b9a0b643afba4f285ce45018e02c0

                        SHA512

                        5ad8cb750c675e5a0d2d7f0124020f5edea59a5741fb01eb1b5d6f0f44d781632cedbbb71f084e13512da1cc3ffddd8891e585fd5eb506e97e87ab38e2c4443f

                      • C:\Windows\{A2B0DF4A-59AD-42a5-859C-785013DD59DA}.exe

                        Filesize

                        180KB

                        MD5

                        242867ad0b4e3573902da48086f3c784

                        SHA1

                        179c96639a09de8db0fea0badec22b22ac12ed08

                        SHA256

                        a459078e855c273578c72c7a7154a4b9683056206dd7c30dd34ae9b8d2c5dfa1

                        SHA512

                        64d8fe0e703b066a39e8ae869ea6856a97c2bcd439da96009d210866eb26490ad167af1987cbb3ac9835d0dfcd8f16a9f22f450c708ad6465e74b288435ea679

                      • C:\Windows\{C76EBB1D-920E-4ff9-9C2D-67F33373C6AB}.exe

                        Filesize

                        180KB

                        MD5

                        1f6364f1b0bd9daf95720b66f07d34cc

                        SHA1

                        d3c095e4cacd9575d1992d577369087f6c4f07c7

                        SHA256

                        c783ee5aca70db97fbfc03b6ee51ed09698451f4a887bb419c1299aa2de3470c

                        SHA512

                        6d83a023c5ce875ebbd67adba03af1e060795c530ca9c5594062540b6851961b038d608f0731ec04ab6e6487b1329b5c3096ec1e2d5bddcddc21e607720336f1

                      • C:\Windows\{C76EBB1D-920E-4ff9-9C2D-67F33373C6AB}.exe

                        Filesize

                        133KB

                        MD5

                        33618d02acfbb60b936d18151e40ca9d

                        SHA1

                        05f134de60827549f0169c988e97becfe800141b

                        SHA256

                        abbfd46c0f947d1d688a1831584a890f51a1a06078513248c6a0915324491fc7

                        SHA512

                        796a93bc8ff059a73f9d334900944a39ce4aa18a1c515cd5bea1036ad578aea0455ce07e166ca965b9b329d3a0405b3e272691a225ae0f79f35ab503aeb55735

                      • C:\Windows\{D30A92E4-80F4-45c7-B97A-1F35FE5D7731}.exe

                        Filesize

                        180KB

                        MD5

                        c7f3e0bda7e3021669654505972a7be7

                        SHA1

                        19abaec45c63518fecf6125ef58e2e5e92de6bdd

                        SHA256

                        3fd7bcbc41a41e95e517dec6d11c79893e1a5376eb7645b8f6ca648b7abddd5f

                        SHA512

                        24514eddd32f585e3f9b3ca15124239c7633fa0c12f7b34eeb7381f5fb203a4bd88a38eb90fd16c24cf30714840c08501a703452f78de40f14e2cb5061d2e0e3

                      • C:\Windows\{E67EB4A6-C428-4572-ACB2-350F02AE38FF}.exe

                        Filesize

                        180KB

                        MD5

                        e274ba8b0daab921f8c97dfe54a3be78

                        SHA1

                        a2c009b9c1c56ba2ca4f9eb74a6d86e2ea59a0c0

                        SHA256

                        13d4d72d9ae5678116daef6bd4707232b5893a0418f4a5f12e97460aa2ed9a4e

                        SHA512

                        cb455c1ef62b32142e6f8ead327fa172876b6ef90e8387e29fb2646d21de677ac18180d6f7a56f5abd5b081b4d952b344e4d3790b8a4343ad7d98e898e153e9a