Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 22:24

General

  • Target

    2024-02-23_33175efecc74924a71e2f737d45f5c8b_goldeneye.exe

  • Size

    408KB

  • MD5

    33175efecc74924a71e2f737d45f5c8b

  • SHA1

    77869c848a95cf1bf4c9a4f47be5df607a3d9383

  • SHA256

    4e98185021c4961096908112456eaf83adce76c24155f2d32eff9cf630f93cdf

  • SHA512

    58e51c9100c7e660686eaa8554a50d6fe1f73c9f9ef0e759c2171b117bdf9e458e243fc24771af6f25bd165ef24e2746a107c8af6f6dc5eda4b8c06bd2b287be

  • SSDEEP

    3072:CEGh0oAl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGOldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 13 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-23_33175efecc74924a71e2f737d45f5c8b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-23_33175efecc74924a71e2f737d45f5c8b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Windows\{E286ADF1-34E1-435b-B17A-0D8811A14B88}.exe
      C:\Windows\{E286ADF1-34E1-435b-B17A-0D8811A14B88}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\{7F4D2DA7-9C19-4d98-AC41-A3894304C416}.exe
        C:\Windows\{7F4D2DA7-9C19-4d98-AC41-A3894304C416}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\{DD804E2B-5618-4331-8880-319F2D47F14B}.exe
          C:\Windows\{DD804E2B-5618-4331-8880-319F2D47F14B}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3992
          • C:\Windows\{74D39210-2ACD-446c-8142-6F87BBB10C14}.exe
            C:\Windows\{74D39210-2ACD-446c-8142-6F87BBB10C14}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2532
            • C:\Windows\{A249B984-EE7D-47f0-95E8-A96F51BA081F}.exe
              C:\Windows\{A249B984-EE7D-47f0-95E8-A96F51BA081F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:396
              • C:\Windows\{130E55F6-1C85-4054-A457-F349BF847F14}.exe
                C:\Windows\{130E55F6-1C85-4054-A457-F349BF847F14}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5072
                • C:\Windows\{7A5C1189-F07E-4ab7-A836-9E06C169A48F}.exe
                  C:\Windows\{7A5C1189-F07E-4ab7-A836-9E06C169A48F}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:220
                  • C:\Windows\{FB8382DE-7031-4294-8B54-44EED5489304}.exe
                    C:\Windows\{FB8382DE-7031-4294-8B54-44EED5489304}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:776
                    • C:\Windows\{086EE8B0-5186-4b42-8B84-020FD0DFD899}.exe
                      C:\Windows\{086EE8B0-5186-4b42-8B84-020FD0DFD899}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1636
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{086EE~1.EXE > nul
                        11⤵
                          PID:212
                        • C:\Windows\{3E396597-3C8F-4715-A2A1-2132E99F27B9}.exe
                          C:\Windows\{3E396597-3C8F-4715-A2A1-2132E99F27B9}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4780
                          • C:\Windows\{5C4092AA-5AE5-4d2c-AF71-652896686D67}.exe
                            C:\Windows\{5C4092AA-5AE5-4d2c-AF71-652896686D67}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3032
                            • C:\Windows\{BE1BE0F6-7AB3-4a97-BE56-23FC1291F354}.exe
                              C:\Windows\{BE1BE0F6-7AB3-4a97-BE56-23FC1291F354}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:376
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{5C409~1.EXE > nul
                              13⤵
                                PID:1608
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{3E396~1.EXE > nul
                              12⤵
                                PID:3864
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FB838~1.EXE > nul
                            10⤵
                              PID:3996
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7A5C1~1.EXE > nul
                            9⤵
                              PID:1076
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{130E5~1.EXE > nul
                            8⤵
                              PID:1384
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A249B~1.EXE > nul
                            7⤵
                              PID:1824
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{74D39~1.EXE > nul
                            6⤵
                              PID:5044
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DD804~1.EXE > nul
                            5⤵
                              PID:424
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7F4D2~1.EXE > nul
                            4⤵
                              PID:4468
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E286A~1.EXE > nul
                            3⤵
                              PID:4568
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4448

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{086EE8B0-5186-4b42-8B84-020FD0DFD899}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  5766cf51445343866c99afbedee5e2ec

                                  SHA1

                                  15e6abb6f0cd4d87cba37e11dc98ee4ccfd55c45

                                  SHA256

                                  e5f85ce8ddbd1f8bdf3773768cf69347622ec45189865fb2ae50a7ce78b8726b

                                  SHA512

                                  d95c29f2f02ee2fa7b0b21f1df36ee3ab91ff782c6d1ccab6e9f648207dc32199496edfb71bf529348f375eb0754bd9c0a0c996e236f1d14ec9c9fae332adafd

                                • C:\Windows\{130E55F6-1C85-4054-A457-F349BF847F14}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  1a1e7c4b75c53f70c6601a3fe7d5f349

                                  SHA1

                                  c91788df15b18bc8aa3116f16e516bae7932dbee

                                  SHA256

                                  df9670f0de0a26f235ebaa627420f913e48c4d9ca99fbade96963ae7498e3525

                                  SHA512

                                  99694ff9eda4f0a096fd9d5c538b3a968629be5c85bb088672056c76c0f7238136a8c45710bfdf5b2ca81f170c9872e483ec69a9d68a640a6ef76054221535a5

                                • C:\Windows\{3E396597-3C8F-4715-A2A1-2132E99F27B9}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  61887b540c9b5dc7e9ba655a632331d1

                                  SHA1

                                  a313c3dc1540c288f0811aa6fcf6c585db8bef5b

                                  SHA256

                                  32525c182a1bc117aec369737f6223e3807a502c40b36d895a2032ec6c0f8a40

                                  SHA512

                                  a60d7d61e2cd22fea570ca4e201764206d76719b0eff55a17e0a14df620d2d47ebb7ffe77484d1ed1793475fa6eda2bc99fc097a43df42f704f1a4176865761f

                                • C:\Windows\{5C4092AA-5AE5-4d2c-AF71-652896686D67}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  d9893060ed6858d845fd8b0ad4ecb92a

                                  SHA1

                                  b6bbef73114e0c740bad32af75f04d2bd2ff4de4

                                  SHA256

                                  372a1165fff7a5f88a50a224e549ea5990ea971d3e5f5922499e4454f70dac7e

                                  SHA512

                                  aa1993c8f33bb896f27d3eebcbc5409ef7a95f8634f5e0c4e4f0d429ef25f500178b92156479938957933e207e7374d0dc041c5d64a895242a3c851818586b50

                                • C:\Windows\{74D39210-2ACD-446c-8142-6F87BBB10C14}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  cc7ce7ca59a61f02375f8e699a8ee0de

                                  SHA1

                                  0db9d3e226d834ed0fbe539780657ac05cf5e82c

                                  SHA256

                                  7f384d59c498327296a7930935fcecd326a52d214b86d94c6d85847b8b5515cb

                                  SHA512

                                  30591da8e0c9cc0a4a58ec25b6c9f8b724b0e72e00fb6fc6e119cc7db8df1d9d89bdeb7ab6a322701dca2c19146ecf7b223b9e905d3ae0f476657a7986ab8b52

                                • C:\Windows\{7A5C1189-F07E-4ab7-A836-9E06C169A48F}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  a000ed8a99a44b11d9061396c57c864e

                                  SHA1

                                  4db164b93690dce19cfdb31925a5e4dc0d90bf7a

                                  SHA256

                                  9a50470d818b5001cc36c120e6e2ba8b678180060c64b243c51b7781a143f283

                                  SHA512

                                  3b72657992e0608f5c126245b28f3c35b421b9c636158f5fe66961428d0de51b6b4ad74f9e3a292038fe412ff96cc5b17da7686e475325285f66e9b3faede1c0

                                • C:\Windows\{7F4D2DA7-9C19-4d98-AC41-A3894304C416}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  4529b3e4f0b005073ae76a5e2d7fb77d

                                  SHA1

                                  9ebd25048bbb01c774abdbcb06f1231723e4c5bb

                                  SHA256

                                  90aaa5b7155948496f2d512c416b59f6ef14052e85a0bd495cfa43e887f79ec8

                                  SHA512

                                  9d437f49888deeb7ca55fd7d022c9a4c6a89e13022625768c0bc4f120a14d17dac6d3d79f4b587c4131b6151f91844daa6d756f50ebd14ef103de1d0408d4ce7

                                • C:\Windows\{A249B984-EE7D-47f0-95E8-A96F51BA081F}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  5265e8767c521b9ebde6017c59aa4e28

                                  SHA1

                                  c0ea03376ac65f3142abc7708cdb69d0adfa8c66

                                  SHA256

                                  b79ad44df2c8707029a088a95723488312200825889e33d032f571680cf08a67

                                  SHA512

                                  5f1763a19095e5921d46e321b1b8bb9e243b65d817c6d04802a12216ae6214e4227ee56d911cbd29d89cdda715556ef0122fe76276c7df22eedcf41ee6b93a31

                                • C:\Windows\{BE1BE0F6-7AB3-4a97-BE56-23FC1291F354}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  9e12014b63a61f28e43ea85673d9e63e

                                  SHA1

                                  05d57a42b9dc57b5c6c0470c5484cc343373c149

                                  SHA256

                                  a5ee7d51c1ecf6ce91ad60d74735e06792a2cf988f634856fa0944529eef4dc4

                                  SHA512

                                  a914b4354a98da96bad5029666c66d716ac2e7b7b022818748d214b03df5d26d666e621767dd0c9d0e8c9acd72c66040aaeb57e0a97801f8d2fa9d8f2e1ce0e2

                                • C:\Windows\{DD804E2B-5618-4331-8880-319F2D47F14B}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  8d3b45d2a5ad6b0927d273599c0aa1f6

                                  SHA1

                                  097c1f8153ef838242bac973b78e18803184d0d8

                                  SHA256

                                  6dfd3beed3bb72559893718953b37b4ae570024e503c14a47fd2b57597779105

                                  SHA512

                                  b30ef4e206dae3a5f58c0154187bb90217ec00dc1fe770813e5ce96ee852b8d893492227a021f1c3a18a3f483edf5c8229f8626b40cc8e28ed981a8858156c62

                                • C:\Windows\{E286ADF1-34E1-435b-B17A-0D8811A14B88}.exe

                                  Filesize

                                  19KB

                                  MD5

                                  95f2dc5ac1cf4a47cf6213c31563b2c9

                                  SHA1

                                  45e85fc4b9b1ae4840df64dff6bc9db1b92df70a

                                  SHA256

                                  95a3012033f5bc37410d497173f10fd3f11f7b18c1e44a7fbe85fdabdef08132

                                  SHA512

                                  76c8bb17121d861abd09d1000e438899ae2f32ee281f74df7c05a4ae4a63d6ec685a57f1e5d6d20af4d7bc48852ad739f9e7d0b5a456244d68b5c986877d1271

                                • C:\Windows\{E286ADF1-34E1-435b-B17A-0D8811A14B88}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  0d95cdcf097fe226361f24d9aa208a2a

                                  SHA1

                                  bd46f38273f905940c721cd85e11df44be7356d0

                                  SHA256

                                  0d6c1456a82f7828201f217fc8a0f0b535302d89a8ab239110519815bf7dd4f0

                                  SHA512

                                  9b85d287890e40c89d9d6ae47e168da9846342bf50fc3d24f65f085f774c1a19329874ea2a4cf0864e2b5c103aeae226286718ffb58f8fde7e42f81bee2a10ec

                                • C:\Windows\{FB8382DE-7031-4294-8B54-44EED5489304}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  20409b21d2357031e2887e4864ff1e93

                                  SHA1

                                  a1808870ca84ac589aaa16d21820a65c8f5048ea

                                  SHA256

                                  f6d2b040bc2d6f0f156e22e4a14ea9a130b5893debe11dc80f27e32c6f2b9f1f

                                  SHA512

                                  a738df1b3fff03ec2e4cd9d036f238535c24284ff68236a6d86d39b826019c0ac9dd057941629f18af107cef0c55576cc83aa5084ed75154036f58249a5c113f