Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2024 00:43

General

  • Target

    2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe

  • Size

    408KB

  • MD5

    2a49504f1ade2affde770d430ade1fc3

  • SHA1

    70bf309fb945154890272adfcec78dfe012ce93a

  • SHA256

    28975c11fb5d2bc68abd8791aa8d80f8a077a05e98b50f45513c4dcf761dbab2

  • SHA512

    aebd8e9a13bb4eba94ee40eebc18e2aa3fda07ab04efd4cb492f503cccc2e14c728aa310259b68e2622fc73b0669ae86152894eb76d853fc454f389e8d421069

  • SSDEEP

    3072:CEGh0oXl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGhldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-20_2a49504f1ade2affde770d430ade1fc3_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe
      C:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe
        C:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2248
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{5C94C~1.EXE > nul
          4⤵
            PID:2828
          • C:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe
            C:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1592
            • C:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe
              C:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1268
              • C:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe
                C:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3816
                • C:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe
                  C:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1392
                  • C:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe
                    C:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2936
                    • C:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe
                      C:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4980
                      • C:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe
                        C:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4444
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E554C~1.EXE > nul
                          11⤵
                            PID:2960
                          • C:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe
                            C:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1388
                            • C:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe
                              C:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3872
                              • C:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe
                                C:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe
                                13⤵
                                • Executes dropped EXE
                                PID:3104
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{DD9D7~1.EXE > nul
                                13⤵
                                  PID:1940
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{0CA84~1.EXE > nul
                                12⤵
                                  PID:2344
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{4D2C4~1.EXE > nul
                              10⤵
                                PID:4568
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{DBB66~1.EXE > nul
                              9⤵
                                PID:952
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{2BFDF~1.EXE > nul
                              8⤵
                                PID:2872
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{9FDCF~1.EXE > nul
                              7⤵
                                PID:4776
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{DF9AD~1.EXE > nul
                              6⤵
                                PID:5040
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{C9FA9~1.EXE > nul
                              5⤵
                                PID:4576
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{678A7~1.EXE > nul
                            3⤵
                              PID:5100
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4872

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{0CA8456C-C469-45f6-AC6D-8BDC417152AF}.exe

                            Filesize

                            408KB

                            MD5

                            6473ee8f83a29ab53294a499f712672b

                            SHA1

                            27130ba5f49d19399c1f8c42122b0e1c279b0402

                            SHA256

                            ea4f0aae4e38386cb0b2a15eaef10c54f4390997752405bbb27f7acdba3cb2af

                            SHA512

                            1d3cb2779d9855bc51191cddf2bc8f6e9e2380d9b9cb44169c9cfc138ccfe52815fe9a88b17fe7d60e18f210451c03dfc625775b588d20f5cb49dd31d450592b

                          • C:\Windows\{2BFDF5A9-F9C4-45de-8632-26C4389F7E30}.exe

                            Filesize

                            408KB

                            MD5

                            8d00cca056cff65d1edf5ea2b1d47bc3

                            SHA1

                            b84dbdfc16e6b2dba229f9b963c8217de2c75de0

                            SHA256

                            b52f61df6ac88e9208d0357b183a3cd32c15e715569be4d0272476c1b3aeb398

                            SHA512

                            abb2b80c4a2a0180ae2092287e26b09b1aff68992738c16f8812457f6fb60e5ebf436f785717a4a33b58d2da7c5664f03de6c7cfe9bba5b27088c6e717e5d7a2

                          • C:\Windows\{4D2C4FF4-D253-4650-AA42-113D4D831AE2}.exe

                            Filesize

                            408KB

                            MD5

                            a435c592d21fc35b33cf022ad10509c0

                            SHA1

                            c21e78ace0d83756f0d27fbbbb47092088d9fdd6

                            SHA256

                            20d6cee04766cc3414b60d909604abc9974bf83d28e232c09841fb5ffd6e39f5

                            SHA512

                            a5a400668c35029232440ac2fad4b6cb43434140b3473e28ef9aeab184601fd3878f8cd4c141779c437527b3e784f9ef902e919ce0678f751ecdfd009f83efcc

                          • C:\Windows\{5C94CCE6-B941-4d6e-BF49-6DD98AD89548}.exe

                            Filesize

                            408KB

                            MD5

                            59ef7a7778c438ac71400928d8629cc5

                            SHA1

                            1680c5532913750666edc962b4f62607500402fc

                            SHA256

                            f04bcc3aaf5756a6b4fa9556a4a7d6c784843e92ab366e6b75f81b4da1674593

                            SHA512

                            bfcb5ce4eb0c1c9ef41e47adf94654230b33103c99b196970d86cfd25205329508863f5169e5174bcd98023a0d69aa0efd47f27eaec7bae09e1e4afcff5c2d49

                          • C:\Windows\{678A7AE2-970A-4968-A198-778BEF8996BF}.exe

                            Filesize

                            408KB

                            MD5

                            9044925773a05d1a8fda98254f597eab

                            SHA1

                            baa66ffc87a631a8a55212b7fb48ce2aa9fb97d4

                            SHA256

                            7f488071779ae2aecbcab77943c49b641a15b36c4333929394e80bb2fdaa37de

                            SHA512

                            cf9d555f2055b140123145c556764fec9dd6c933d6cd77de49beb471f24889edaa4b969fb70db38ffd2c63f4eefbf8dafcfe3675ce52b4bfb135dd112a8ffc32

                          • C:\Windows\{9FDCF700-5F01-476d-BE0D-44EBB7F82642}.exe

                            Filesize

                            408KB

                            MD5

                            014ab4b657783a58b4c1f6cff1932a5a

                            SHA1

                            c992040cb4309908b7d30d9659ed04af290dd2c7

                            SHA256

                            ad9fb52d40d0448c2191bd570441a8f7be344cce1445b6eea44a3fc276bbf8fa

                            SHA512

                            32c1840a3875316db88f8f7e40487969392ee3288d0f6cf2c410f0601a5b155646237a061b5c66f7a316bd6c807e3ac044028b85dbf391f31e92f397394a8ac1

                          • C:\Windows\{C9FA9DD5-5673-4f90-8B44-A482C55F6EFE}.exe

                            Filesize

                            408KB

                            MD5

                            0bdbe89ba7cc3843611e0877ee5ace46

                            SHA1

                            f14581a34442feb172d658a6b4610b437d51ba96

                            SHA256

                            678928643961b03b0ce541211b217b0c22eee559738b69aaabe0460ced35847f

                            SHA512

                            eb8c0618c34b094416afcda4fb064e26e07835150c514575611e3f32ed955208068424888292bf260db815d8ace97c5ecf79bc3d031e8415cd247216a63a55dc

                          • C:\Windows\{CE815E38-2E58-4e83-9BE9-673ABCE4754A}.exe

                            Filesize

                            408KB

                            MD5

                            f362096e20909247c178e4521a532f88

                            SHA1

                            ef179172d5cb548360f4168d33855db40aea694e

                            SHA256

                            d1ad07ed6bf3f0e90c41c15938850ce860dd340113be5e7b303380b1d29350e6

                            SHA512

                            1fe73dadcb01db9f0666d08fd37dea827190f6f311c32e9a6793670dc1fa7ed296136184d5b0d0ed45a2a1fbe1812402db03173864d62ee91a56779df0424b53

                          • C:\Windows\{DBB666B5-0357-4e87-A946-EBCDA7ED63A1}.exe

                            Filesize

                            408KB

                            MD5

                            8418564c3eae59f66b526c89794f79bc

                            SHA1

                            d327b01271042e66392843f99df3e8356eb8292e

                            SHA256

                            3c3b7f53d7ad4e107d04b97b0fd65cf5b9955ae3415851673bd24e31f65690f0

                            SHA512

                            1c21123e23fff8203f96206d4b84371eb86f7b0adae5d11331b10cd0d11949ae02f51acbc6dd37334a94e681f6e0df6240568e1d7e1d898baa9a96322f0c7816

                          • C:\Windows\{DD9D7B45-2B1D-4deb-9947-BE5F30FD00EB}.exe

                            Filesize

                            408KB

                            MD5

                            260891be7fc933b33e81197e6d4d9218

                            SHA1

                            335844da94d22e55acb06922ba7ae8173ba0e9e2

                            SHA256

                            e691b8cd01c4bb44c49aa3ed17f9ae309ed9f7065ef6b3422a0da5d2cc0438a0

                            SHA512

                            43eb85302d3f39bcca0fa02e2ae0b894f3fff6ddbd0d8688d574e54704a942df3a90a58e89f5d36745bac306cef44ab60780b531e136b1323dba7758cccbbd5f

                          • C:\Windows\{DF9AD0F0-5EC4-4d28-A1BE-A0F176D25EFF}.exe

                            Filesize

                            408KB

                            MD5

                            5abe56bdcb1790b52e9d7da1885a354a

                            SHA1

                            f175e5218115dbfc22ddc65c08feeda561d5f65b

                            SHA256

                            191a8ba1dcd662c5dc076f8ef6ad559ad82586c424543002ee2d847c9ad3103d

                            SHA512

                            1fdde2a6841ab6cb54c916f27689be594659e922cb125919e44fbc431418f168850da9ae830bddf98765ffd4d3780a940c0dfeac3c8d271cde1814fe57aa634d

                          • C:\Windows\{E554CA38-11E6-4176-94FE-5FA88CB885C0}.exe

                            Filesize

                            408KB

                            MD5

                            0300392299cf8fd50f5aad4ead17ae3e

                            SHA1

                            fd4f5a2fecc9052c48016d0dcf5ab1a595d1351d

                            SHA256

                            184291bef7d144811ea34027bb42505937db81838133125e6d625a27d09b4143

                            SHA512

                            cc62235253446ad989402460a5567c5d237b33644c271de66a6b1b99fc8a9d4960d56dddde7dc75bbc0e9097f215a5d7de86f691a7f565404655de03da2e66e1