Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 00:53

General

  • Target

    2024-02-22_d61b56d195a6fa70713ae1952ba10143_goldeneye.exe

  • Size

    344KB

  • MD5

    d61b56d195a6fa70713ae1952ba10143

  • SHA1

    af93c01bc78c3e08b73db23eefdde40ff074141b

  • SHA256

    e170590c78ef43039c630428b193c03d3eb1b9fb09c4c80648f2142712570017

  • SHA512

    ab800baa4836195e70431ae8830e92fbd42d17b638dbfc716e29499cefce6850360a05e25e58dc9bbdfbd5db91b340f0f0ab6e423cc9467b96142cafb3b84991

  • SSDEEP

    3072:mEGh0otlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGnlqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_d61b56d195a6fa70713ae1952ba10143_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_d61b56d195a6fa70713ae1952ba10143_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\{C1F21D73-7DEC-436d-ABC4-FD8C56DAF7DA}.exe
      C:\Windows\{C1F21D73-7DEC-436d-ABC4-FD8C56DAF7DA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Windows\{9B224681-388B-4131-93D8-39FA92F00E80}.exe
        C:\Windows\{9B224681-388B-4131-93D8-39FA92F00E80}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\{02C2AB08-BC61-4379-B6D7-A7F8209486F6}.exe
          C:\Windows\{02C2AB08-BC61-4379-B6D7-A7F8209486F6}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Windows\{BC7E49FD-9417-4770-8B5F-063DDA0C6DE5}.exe
            C:\Windows\{BC7E49FD-9417-4770-8B5F-063DDA0C6DE5}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Windows\{E3E74963-78B1-4075-AD8B-4F9578DF2AA4}.exe
              C:\Windows\{E3E74963-78B1-4075-AD8B-4F9578DF2AA4}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:908
              • C:\Windows\{6FB338A6-7D8B-4878-A750-C680FF908095}.exe
                C:\Windows\{6FB338A6-7D8B-4878-A750-C680FF908095}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2684
                • C:\Windows\{0FC6CD96-E852-427d-A39F-4805AE14ADC5}.exe
                  C:\Windows\{0FC6CD96-E852-427d-A39F-4805AE14ADC5}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1744
                  • C:\Windows\{BA5CAC09-CE9C-40fe-8ED2-579040FA8C52}.exe
                    C:\Windows\{BA5CAC09-CE9C-40fe-8ED2-579040FA8C52}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1856
                    • C:\Windows\{135867AC-20A5-4d81-8199-308905372871}.exe
                      C:\Windows\{135867AC-20A5-4d81-8199-308905372871}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1436
                      • C:\Windows\{3A68E2E9-A02F-46d1-8206-5A3DACDCBD40}.exe
                        C:\Windows\{3A68E2E9-A02F-46d1-8206-5A3DACDCBD40}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2056
                        • C:\Windows\{B10FD96D-4D6E-407c-8C74-D25B1421FF8C}.exe
                          C:\Windows\{B10FD96D-4D6E-407c-8C74-D25B1421FF8C}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2972
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3A68E~1.EXE > nul
                          12⤵
                            PID:2036
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{13586~1.EXE > nul
                          11⤵
                            PID:2192
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BA5CA~1.EXE > nul
                          10⤵
                            PID:1384
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0FC6C~1.EXE > nul
                          9⤵
                            PID:1636
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6FB33~1.EXE > nul
                          8⤵
                            PID:1948
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E3E74~1.EXE > nul
                          7⤵
                            PID:2320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BC7E4~1.EXE > nul
                          6⤵
                            PID:624
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{02C2A~1.EXE > nul
                          5⤵
                            PID:692
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9B224~1.EXE > nul
                          4⤵
                            PID:2884
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C1F21~1.EXE > nul
                          3⤵
                            PID:2940
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2648

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{02C2AB08-BC61-4379-B6D7-A7F8209486F6}.exe

                        Filesize

                        344KB

                        MD5

                        a7e2fcfbcd14e032776298ed7eb0878e

                        SHA1

                        5228a004765edd2ddd7510077f910605002dac98

                        SHA256

                        1811cfaf0edb11f07b6ca5a7755db978fd30de22e1ad54417bc5fe18e6386279

                        SHA512

                        f02d397bdf245608473b4b40f49f7ce2cdc8675530d91b444de33802edd50914fe8ce20a745ed5d2d03bd860497f7d85e9e11bc6f0215eacb4f8cc61b715e8c5

                      • C:\Windows\{0FC6CD96-E852-427d-A39F-4805AE14ADC5}.exe

                        Filesize

                        344KB

                        MD5

                        ecdb096874e032a642959d8f111a7673

                        SHA1

                        5318c812dd98907f7a25ca2f9675fc698622e596

                        SHA256

                        8e7554620cb4736fe834edd15c726d9587a4d9149c2f5ebb7d03cdc261bfb522

                        SHA512

                        44d706af5b1017c9e923b96c6e80511cb65c64686d0e037a07a0f2aba5e93ec8f329813adde44884dc14548784846eccdb36bb3306806bf2e3cf673ff8bdda1c

                      • C:\Windows\{135867AC-20A5-4d81-8199-308905372871}.exe

                        Filesize

                        344KB

                        MD5

                        39248baf8b34468d40acb326c6e2ece7

                        SHA1

                        9207766f68befa3f8564dc9698952905f3259421

                        SHA256

                        25a668e57df27261f8f6f8746cf71f1c03ab96ac0d73f2a30cd0407456001e5c

                        SHA512

                        efd9b2c6d0eca04a07009c0002ae344e8c2f0dd830f5ac9aa430a704bf7f128eab754cd391d3749aea01e08cdfa52028d82239bcb300bc970503b6fd31b1c910

                      • C:\Windows\{3A68E2E9-A02F-46d1-8206-5A3DACDCBD40}.exe

                        Filesize

                        344KB

                        MD5

                        08b7894e0ce750b7cbeacca96d73f06a

                        SHA1

                        111b643fba65be79a4bb46b91c162e71c78ea680

                        SHA256

                        d92ae3779e9e19c5dc995cc068bf7a0fa95c1a60ff267cbaaf8c3367ae64a061

                        SHA512

                        025e610083ebd98ef019958c8ce346180f209f58b191abb566325af0144643ed8a59780b4655a2d41f30e1fa237b95c1b0d64ceac11b21e8210dbc6ace201933

                      • C:\Windows\{6FB338A6-7D8B-4878-A750-C680FF908095}.exe

                        Filesize

                        344KB

                        MD5

                        0f17e9cd09a29f364e4b41d8dea12855

                        SHA1

                        c7333851c9f250d40640ac8b13520ae2c92e23fd

                        SHA256

                        fdb1a7fe2aa88cc56821a3f81c1ccf3f4a83aa8ee9e661c86f5232f4eeb110ef

                        SHA512

                        e5a4f2daa74d7f1a8eae08e5d923c583f2f40e7741d27ddcd437cd7a200202899540533d285bd0f2608eb2e9974551ecbb6de130c70b809cea0d047022ec14bb

                      • C:\Windows\{9B224681-388B-4131-93D8-39FA92F00E80}.exe

                        Filesize

                        344KB

                        MD5

                        47ec2e2cb29bf7e6ac5b1d625b431894

                        SHA1

                        88fb0f295c519004050aac0cb4b99fb3ac6cd88b

                        SHA256

                        445a8ff1113e4817fa21b6fedb2057d4afda586e6b524e75d4bd4364811b0121

                        SHA512

                        af6ed109c43def57076379eb3b6a17115ca9ea1d57494c3b7dd6f7b4a308a3aaecb02a8734cdca3b9c2c6ce116a2b7dcdfe40be5a5d4aa5bb1aeace188e73eca

                      • C:\Windows\{B10FD96D-4D6E-407c-8C74-D25B1421FF8C}.exe

                        Filesize

                        344KB

                        MD5

                        78179efe271f01779f465fb2e5bc2801

                        SHA1

                        1138b139945be94fc119926c7f9b0eef4268dbec

                        SHA256

                        6338f5cf4dd876cc9e85601b9292d0997699689d6928b78fa9baae9a84ab4335

                        SHA512

                        61341ec62489e34aa695cd0b66132586514333ff3fc030f0d5e527106f388e62a9792a4e9c49e0b480d8fe462707757580fa6287cc14c8599a4791bfe86c7842

                      • C:\Windows\{BA5CAC09-CE9C-40fe-8ED2-579040FA8C52}.exe

                        Filesize

                        344KB

                        MD5

                        6c775e4c24c150f841deda44c8102c1b

                        SHA1

                        046501a877b643f583465d973fae13a15b13ef21

                        SHA256

                        d246d98d3808bc83ccbfc26189552e07f175acd498e8d6a4e36a608f3a1ef07a

                        SHA512

                        35efdc011a1025ceac1041fbcd10143c46bec478b3f702ce35576c1435b76b8446843263d1367e11a20dd11555260ee5850d3299475e47e6af67991e73fb3da6

                      • C:\Windows\{BC7E49FD-9417-4770-8B5F-063DDA0C6DE5}.exe

                        Filesize

                        344KB

                        MD5

                        55f838234c87af54cbf92666d29176c9

                        SHA1

                        db6f8d17462f23b4630016f2b55be738aabd7657

                        SHA256

                        4eadfc8f05b772e4f97938b360df616f1d78f63027360c627a738c4b13a71edf

                        SHA512

                        8aef53fcfe8c126b0a066d2e3044f6a2999bcad4cc6ba5c574832f84995c9c650fa257277220a650222c469b50502f7d61fcaed528349191144b6fd1acc36363

                      • C:\Windows\{C1F21D73-7DEC-436d-ABC4-FD8C56DAF7DA}.exe

                        Filesize

                        344KB

                        MD5

                        b3a5c2fe324233008f9349aef8f0d6eb

                        SHA1

                        44cb384fc165217493f8b416494cb3afaa3027e4

                        SHA256

                        d42f67f501c2f73ec4dad79642a3fe8eee02ce3c95464f21fb5cec0001b74283

                        SHA512

                        3f6920187471d43475f8dcda2380b2c2fb676909a5ca815588d82c1839cd15bd223aa7d01cc040457e3f242e817e6b4bacf5c098acc07f17479c0d33648bc3e3

                      • C:\Windows\{E3E74963-78B1-4075-AD8B-4F9578DF2AA4}.exe

                        Filesize

                        344KB

                        MD5

                        0f942894a8f738b4e6d6bd856f893c05

                        SHA1

                        d36c70ac8b883e4186343e9f76a407ace78ace43

                        SHA256

                        9ef4579ce465c114bc0695643e36775fd439f1bf6e70c3250d34871cb1198add

                        SHA512

                        79bcc9c0618900afc538d963ab54b12d2be91a6f8ff355fb932d2cbd848c8c58b709ea31cac482c44b2089459c5b0c5a40e0ee2634db1096d3505cc2670f2490