Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2024 06:15

General

  • Target

    2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe

  • Size

    344KB

  • MD5

    ecc271e769b6e917219bc673229c0bbc

  • SHA1

    2520d525d3f75e0f76e56bc8a7f106858b9b2a39

  • SHA256

    9e0852aaa583991114b244b5a255ccc0a2f55dae086fa48baff887f32f99ea35

  • SHA512

    55b289620de5b5f2b7152c1b44569c166bdb65a5acc5156c5d739b1acb960794edb7804b833a8fd1f668149790740f59d9ef36ac8f776170f6d6f0b0541579a8

  • SSDEEP

    3072:mEGh0oxlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG/lqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_ecc271e769b6e917219bc673229c0bbc_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe
      C:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe
        C:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe
          C:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe
            C:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1772
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{8C1D6~1.EXE > nul
              6⤵
                PID:452
              • C:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe
                C:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5104
                • C:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exe
                  C:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1880
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{12336~1.EXE > nul
                    8⤵
                      PID:3832
                    • C:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe
                      C:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1284
                      • C:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe
                        C:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3920
                        • C:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe
                          C:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4940
                          • C:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe
                            C:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe
                            11⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3184
                            • C:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe
                              C:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1204
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{3AD78~1.EXE > nul
                                13⤵
                                  PID:2728
                                • C:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe
                                  C:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe
                                  13⤵
                                  • Executes dropped EXE
                                  PID:3696
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{13D1D~1.EXE > nul
                                12⤵
                                  PID:3652
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{A2030~1.EXE > nul
                                11⤵
                                  PID:936
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{0D327~1.EXE > nul
                                10⤵
                                  PID:880
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{B4C76~1.EXE > nul
                                9⤵
                                  PID:2380
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{E3707~1.EXE > nul
                              7⤵
                                PID:408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8B60C~1.EXE > nul
                            5⤵
                              PID:4212
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{239BB~1.EXE > nul
                            4⤵
                              PID:2240
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DCB58~1.EXE > nul
                            3⤵
                              PID:3280
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:916

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{0D327938-D1E6-4418-BF92-E7AD05BE77ED}.exe

                            Filesize

                            344KB

                            MD5

                            8454fdbb6777b778962d9ea6a85a3846

                            SHA1

                            5a0f6830c20f0c28f18271d2719f9ecb9dbfa794

                            SHA256

                            5aff40910b1b6847249f4d7dfbf34c764e2903e81eb649d770f28510022e5cfd

                            SHA512

                            5ded0537e8e75ec3d047371d3648255958738e7878280715407de4e96180efdbe08b5c2b39eed39786f352c3a5a8610ea077c3e58ed21f430ebfb0dff8ae2a13

                          • C:\Windows\{123363B5-B893-4712-890A-E92835619F73}.exe

                            Filesize

                            344KB

                            MD5

                            426ec87f943bf2739684edec1043b7ff

                            SHA1

                            268585beaa97f8d57b61a4ed1eeb38d9b870ec66

                            SHA256

                            c10b21233a3ac36e7e93eab414f1af3717de7a95ec58785120daf09f655ad538

                            SHA512

                            6414116e556de7b5e9c97a7669e0ba22b31ca1e78663632b89518e74a6cf7457cde83041345daa6587fedab705d36b1dcdc64b8ac823da7c47279b0431828cc9

                          • C:\Windows\{13D1D3D7-EC68-4839-9E90-8BD80CB32AA1}.exe

                            Filesize

                            344KB

                            MD5

                            37031a9fad3a021ccc4c8227b494a4d6

                            SHA1

                            15cdc77bb0d0ae3c22ac262e4a6222be28e8eb88

                            SHA256

                            3f204e422103ab0ab4978afb3d7abe9a39df55f54ff4e601d71ec8a2a542514c

                            SHA512

                            9afa5f5ab65938c344dee99cf22dd00e847741b0e7aee434a47e473de9edcd09a2291fe9e81bfe87c911580a18b190bfd32bc3a419f131b63ac0415d33b3c9b3

                          • C:\Windows\{239BBD0A-AFB3-475e-A10B-879DC3A77D7C}.exe

                            Filesize

                            344KB

                            MD5

                            2c96e0ec8349953f1b59c9d20c7737fb

                            SHA1

                            28c29d33b7b9250421fcec1bca135ba7c20fb7fc

                            SHA256

                            b7e44109e1eb6a4cf8ba57f2b5afb3fd9e5a801dfc28ea010852d18e24382c7d

                            SHA512

                            e12f9905230530d66dcf4a16180e764c4d15bf8056f45f07678538f6c05935f58170f57bf870e8ab5cdf3431964664761bd8f10258dd9138974543e692f0244f

                          • C:\Windows\{3AD78905-1CB0-4d11-ADC7-54B699AE22E2}.exe

                            Filesize

                            344KB

                            MD5

                            63abe9f9dafcc0fd3abdee6d405997d9

                            SHA1

                            ce8448c1a7b8db1c5c708e4cf6d8bceb20a4f73f

                            SHA256

                            ed10f4ba75b3c317e0d6357b228e90b365d8bb982cc5907e416076c7c96ba4aa

                            SHA512

                            77b23079a70796532298e2fbcb59b5f7aff60ffc5731d7e0b7bbea0c1cc58c98b390b1aadc1b2d54093ea718ea720e872587f7fff56546a5558f88ebdd6380a7

                          • C:\Windows\{8B60C6FB-6978-4a15-B05E-A769BAE96592}.exe

                            Filesize

                            344KB

                            MD5

                            149aae8a448592fc29f25682e522cf93

                            SHA1

                            fe085f71a96eb85857f2d52a7ba7cffc6fb223e5

                            SHA256

                            35503a6343cdcf281e9278f6918c03583056dabe3b5a986c7c39f3e7451ab548

                            SHA512

                            489fdeb3988b918bc6f0d8f623c0e8d2af08817b297340fef30193e2bcc4c79e63e07f755fce38ddac51c99403c3edf117fd8432879ed580ddb61175ecfb4f74

                          • C:\Windows\{8C1D6E0E-420B-412b-AA79-724ECEC57622}.exe

                            Filesize

                            344KB

                            MD5

                            fbc30d003fcadbd96f4c2b8a9dc385e1

                            SHA1

                            85e98aa0ae89e5ae80f1158d252bf549b5cdcaba

                            SHA256

                            cc528c53958568ecdba838ade9ad2461e5bccacf2fc04731d5e48cc28e705c7d

                            SHA512

                            94b710767ad2f0fa192a6a1bd7c57c860c898704c5c703e3799d54a28526ac965b991cf7fcb72dc53913852fa197f9dda7fbfec3b64ba35003b5a720a62580ce

                          • C:\Windows\{8DDDA185-7440-44c3-94D4-C87C50979E9E}.exe

                            Filesize

                            344KB

                            MD5

                            ce79ede17051e08d00c165c143380f24

                            SHA1

                            9e3722966b74553988439376ad531f2f26b988ed

                            SHA256

                            6aaecc9cf0f1a1db5c3c9aa1b7a087a95a29cb53ff2d9c11686f167da7e36244

                            SHA512

                            04da4b61c69658955bfd062c632323c2193223673c8219270dd0642e6aa5f4f407b01c56f222d062c72e8cf0b0d79fa24fa07dfa93566670ef4679eaa0ff22b9

                          • C:\Windows\{A2030D44-745D-4eab-BA46-E2ADAB5A3F7D}.exe

                            Filesize

                            344KB

                            MD5

                            231a89425867b3a097bcdeeecc09b021

                            SHA1

                            7a8d6f8e29c944b6f3fed88c8b75ef22d7ca9e21

                            SHA256

                            471c38751ff509023646d7dc93402b5fc7a5a5c3853d4218c1bc4a86818c1cc7

                            SHA512

                            8efafca1a8e16248fdbc36c355416ddcfa52a74e4070562f5895f5558bbe5435ddfa1e7165a4255127c11bafd4566550ded48363aeb7327adf65dd79bbb94b7c

                          • C:\Windows\{B4C7657B-9145-4103-AD69-2F04AAF2FD37}.exe

                            Filesize

                            344KB

                            MD5

                            bf6d0b0d66598dd968f9e1f17e49a079

                            SHA1

                            732cf68cba188515590ceac6217783c94427b792

                            SHA256

                            8134a7961658b5eba70b773b17350ed18169931c5caeabc9e4b5896c417e4ee3

                            SHA512

                            ae16d25654fc926b45738994c6c85845f192415a408e11d1e6e3880734fece7886449b8efcb07e67225694902818a0c70af521e7327a958f5eccdcd372149cf8

                          • C:\Windows\{DCB5891F-97A2-4061-8CAC-B19A91E1EB30}.exe

                            Filesize

                            344KB

                            MD5

                            3ed624191d4b01206781ad161a449562

                            SHA1

                            eaab336e1bbdd3c09697899b61c6a8c339c94362

                            SHA256

                            952a8d0ababd9c72495a01e964d6bb62c504a6ce267be0d0faf7ba4beaceaa7e

                            SHA512

                            8bcc45b368eabe24ff0a551dad589703d7363fb993270950b42aeac5efcaa133a117fce8af8637027b75cb4307edd63b5d56a89499ecf6c870a382cc6c94dc24

                          • C:\Windows\{E3707D52-5EE5-4526-901B-8AD99E9B71B2}.exe

                            Filesize

                            344KB

                            MD5

                            d42c4acd1b4dc85cb6b83dac431e6014

                            SHA1

                            334ba2bf170a41aff9d83a43fa3b37a2b56ecb27

                            SHA256

                            1e6c2a93af1838a8eff10b1b1b978199ce0e0140efee32bf7b313bbeb6dce68a

                            SHA512

                            c089ae5e795f3a21165ed3bac69d3c18ff40f043ff03f3f2fd296217a9c3c314af0198b078f1f5a3c937cde9b30593826ddf7cb9e874d41885a5689c50033aa6