Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2024 06:15

General

  • Target

    2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe

  • Size

    344KB

  • MD5

    ecc271e769b6e917219bc673229c0bbc

  • SHA1

    2520d525d3f75e0f76e56bc8a7f106858b9b2a39

  • SHA256

    9e0852aaa583991114b244b5a255ccc0a2f55dae086fa48baff887f32f99ea35

  • SHA512

    55b289620de5b5f2b7152c1b44569c166bdb65a5acc5156c5d739b1acb960794edb7804b833a8fd1f668149790740f59d9ef36ac8f776170f6d6f0b0541579a8

  • SSDEEP

    3072:mEGh0oxlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG/lqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\{8AC07853-97ED-41c8-9B13-5FE550ADDC38}.exe
      C:\Windows\{8AC07853-97ED-41c8-9B13-5FE550ADDC38}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\{9041350C-EE50-414e-9CE8-416D212EE781}.exe
        C:\Windows\{9041350C-EE50-414e-9CE8-416D212EE781}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Windows\{85BEF514-CE1F-4dca-AC7E-B78873775A75}.exe
          C:\Windows\{85BEF514-CE1F-4dca-AC7E-B78873775A75}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\{E2F00070-AAA3-4ad2-80C3-21BF77C419B8}.exe
            C:\Windows\{E2F00070-AAA3-4ad2-80C3-21BF77C419B8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\{D946FFE9-0507-4ccb-BF65-FDAB352EEAEC}.exe
              C:\Windows\{D946FFE9-0507-4ccb-BF65-FDAB352EEAEC}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:864
              • C:\Windows\{5BCE2782-09A3-49ce-8BC9-35052E207AFD}.exe
                C:\Windows\{5BCE2782-09A3-49ce-8BC9-35052E207AFD}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1604
                • C:\Windows\{FA224D07-2394-488f-BA62-689A0DEAB74F}.exe
                  C:\Windows\{FA224D07-2394-488f-BA62-689A0DEAB74F}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1184
                  • C:\Windows\{CEACC5F6-AD1B-4235-9EAC-033945676A11}.exe
                    C:\Windows\{CEACC5F6-AD1B-4235-9EAC-033945676A11}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2264
                    • C:\Windows\{2AF5E167-B788-4de9-8FDC-C160901AE6ED}.exe
                      C:\Windows\{2AF5E167-B788-4de9-8FDC-C160901AE6ED}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3052
                      • C:\Windows\{AE1A534B-3B3A-48e9-8FDE-C988A5B811B2}.exe
                        C:\Windows\{AE1A534B-3B3A-48e9-8FDE-C988A5B811B2}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2068
                        • C:\Windows\{8758ED88-3635-4735-8595-9EEB1B18FABD}.exe
                          C:\Windows\{8758ED88-3635-4735-8595-9EEB1B18FABD}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:812
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AE1A5~1.EXE > nul
                          12⤵
                            PID:804
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2AF5E~1.EXE > nul
                          11⤵
                            PID:484
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CEACC~1.EXE > nul
                          10⤵
                            PID:2216
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FA224~1.EXE > nul
                          9⤵
                            PID:1180
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5BCE2~1.EXE > nul
                          8⤵
                            PID:1720
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D946F~1.EXE > nul
                          7⤵
                            PID:1488
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E2F00~1.EXE > nul
                          6⤵
                            PID:2636
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{85BEF~1.EXE > nul
                          5⤵
                            PID:548
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{90413~1.EXE > nul
                          4⤵
                            PID:2380
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8AC07~1.EXE > nul
                          3⤵
                            PID:2600
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2952

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{2AF5E167-B788-4de9-8FDC-C160901AE6ED}.exe

                        Filesize

                        344KB

                        MD5

                        2172c01a7e31f3471771784161921b02

                        SHA1

                        9e4e5b863c511fc8084dd41695c43083980581e1

                        SHA256

                        e5dd702e732fe257e692eed5abc2cef8bded1e581b5bb5bf471d9f0893f4aa4b

                        SHA512

                        3c15447281c28e75a5236935ab1028e4accd423c7b2f5c520da34fa6edd3fd6576d951c2aa9aac112524d77e869fd6a35c4215f6b45b10733bace56958558f34

                      • C:\Windows\{5BCE2782-09A3-49ce-8BC9-35052E207AFD}.exe

                        Filesize

                        344KB

                        MD5

                        04834ed3bbbfb1facbeb628da4eac1c5

                        SHA1

                        db7b3e539c214a90189147dd23468bfbd0c87af8

                        SHA256

                        030fb6810a97a3c4723fc5b9ca5211a263a5473762458c6ffd1b8c48f83a8633

                        SHA512

                        21a607c57781dad17a33ef62f71474d7800b2f6c00928d9731fd8dc826e4c973c1102a3956495060f4bb34bcbdd9793d0b7ae8352bd37c76e87bbb48875e2808

                      • C:\Windows\{85BEF514-CE1F-4dca-AC7E-B78873775A75}.exe

                        Filesize

                        344KB

                        MD5

                        1ef6bfdb575b0a382b91ed381c5f9efe

                        SHA1

                        3f796b3816b75bf2b83e75d0271b5d1be4628324

                        SHA256

                        4300391ff98cd3aa63ce638d4d8283edaa6680de460c92b932cd17d1d64bd73a

                        SHA512

                        9f41cdfc7646515e06371047af8daa972c37e4354a00a44cbcb562fe06a88b01aa5168f2176d8eecdea229f7ac37a285d038a969d42d3230a457b724459c7309

                      • C:\Windows\{8758ED88-3635-4735-8595-9EEB1B18FABD}.exe

                        Filesize

                        344KB

                        MD5

                        03788f79f3ecbab8688a59774abc3d52

                        SHA1

                        915a0af7bd7e458bc67f6510f37d42e6d619a351

                        SHA256

                        4f2e6bb849fba94a024a05b74bebe18ddf44215889de9f09307d3c896f9d5c74

                        SHA512

                        c96bfe032639ce8618860a8028be6ce5fb5e9aab758699051210306325ebe56c545305529b34c6959e8bb72b43dcefc899c363543ce3733bd61604c2411c09d0

                      • C:\Windows\{8AC07853-97ED-41c8-9B13-5FE550ADDC38}.exe

                        Filesize

                        344KB

                        MD5

                        03162fba1750e0aa68f9309099d0fbeb

                        SHA1

                        8c847992801541361bbd340da90d1a430515a178

                        SHA256

                        b52da43fa0d5dd7a7a330968a60a9d48c46fa206fad7e93610e2dcf5c7842821

                        SHA512

                        26ae5a1e684f2054a51bb0c369604293d6c72df25bfbed4b1117021ad92d6293762936cf88d7565a95b7f8afa545ba15ec1afb56b41bc3119c162e719efe72ae

                      • C:\Windows\{9041350C-EE50-414e-9CE8-416D212EE781}.exe

                        Filesize

                        344KB

                        MD5

                        f29a560f83cfcce3f18273d2b441688e

                        SHA1

                        7bda50682f8fc16feda7bbfed457ec792267250e

                        SHA256

                        f5fde9a395b827455de520096fc3e60b21582cea17d9c4e98a183a4173724531

                        SHA512

                        d784b4b7991ed165e50d25937f4215b577e2cf9c58ed6035bc28e32b723bb7cf4df23a548914d4fe43fec6ea610ae9d8f7351a3a15a7a7f37473b06defb31894

                      • C:\Windows\{AE1A534B-3B3A-48e9-8FDE-C988A5B811B2}.exe

                        Filesize

                        344KB

                        MD5

                        27d5fb0ccada93299a8142bf7d7cc174

                        SHA1

                        97e440efb12c10f16133fc3a1ba4e1f613200cdd

                        SHA256

                        0ddf16938bfad1a7406fffa28b56c68b5066540e045fc016ca72c7e7b9d8bf54

                        SHA512

                        36878455782498f70aa8f3dfac7c849bfdcfa703112c8dbd140f697f8e67ecf2468cad5e23e34b1a52f68057220c127f868bee7409f52d3a2a084f4ac88f1826

                      • C:\Windows\{CEACC5F6-AD1B-4235-9EAC-033945676A11}.exe

                        Filesize

                        344KB

                        MD5

                        011223e534906f06cbd8a99c9d7cb067

                        SHA1

                        d3e26f10bc8235832eaac07b5b35bd2242df1427

                        SHA256

                        fdfd9bfebb8c26088aa6f30e8277e76002d4c59174cba112b5bd9d40c0367098

                        SHA512

                        b86edd50f55e56aba51b43dc44b7b050284f63120be0ee23bfcb690f608d4217c20c13e3f4b466e1d3abc2201388e62c217deed3fb0277cc0339985ff8c8b969

                      • C:\Windows\{D946FFE9-0507-4ccb-BF65-FDAB352EEAEC}.exe

                        Filesize

                        344KB

                        MD5

                        3449d59b998c112e05a5da727c2940ef

                        SHA1

                        14cd072fee78b910b901ba21dac23843bd171cc3

                        SHA256

                        025df8fed2c14c931672ebb0831eea74cc058b03abf533a3e74e4a2e39db32f7

                        SHA512

                        b0b8a5a8c3e7311da25036e5bfdb3e1cd7a73adce98ea204e1c07a664ee35e7e6cfbf85e392f9d7cdd386230ff7c08acb3745db5ac3d939ff9b8cc5c97dda28a

                      • C:\Windows\{E2F00070-AAA3-4ad2-80C3-21BF77C419B8}.exe

                        Filesize

                        344KB

                        MD5

                        7e36d94d921781a1688190880f17abb7

                        SHA1

                        e53efdae5c81c5c7ed8d4588f3049a761c9e48c1

                        SHA256

                        cc1b68f7ae3938cf4234dbc303b0c251b22c3eb73713e83fcd3db87c1f373ca9

                        SHA512

                        86a7571e8755f690c42453e2afbaf6ecc914c554cd51c806acbd3862ce19a112842292a2e82d229259e4bb9c2ce35c27ccedfc7db217d75342032bcd1c4726e4

                      • C:\Windows\{FA224D07-2394-488f-BA62-689A0DEAB74F}.exe

                        Filesize

                        344KB

                        MD5

                        2b36a7de39d1dc4b7cb62742485c174b

                        SHA1

                        3e592f84c717cd36402d8ca8e476222fbbc27a83

                        SHA256

                        00108c16ae9a7dc7221b5daa3d787721eec241ca5e6832cb082f6f7b27186b34

                        SHA512

                        3d965b7908f3ed0818fa836e7fbe7d86ecb443a8e12adaf322cce5e8e175a24c37642914e68bcaeb0c1acbf797fcd53ee19137ce16bb4f73fc641268cbf71dd8