Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 00:43

General

  • Target

    2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe

  • Size

    344KB

  • MD5

    055a4b707a867d90bfc0c6b14b4c1510

  • SHA1

    6b40f8a990e99609bb2cd4ec73e9cc3c04d89bde

  • SHA256

    00178c1b72221f42a822514a54915f2536ed3fc7955e8207dbc52e9fbd4d644d

  • SHA512

    3ee418b031c9279323ec4df0cf75e6ea5885a957d253c049d9bf5e7fa8ed00b17e12ec1ec2d8fee2b5598f9098a78a3863887d2cd57e3da532c5f01c6bfeb395

  • SSDEEP

    3072:mEGh0o4lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGulqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-29_055a4b707a867d90bfc0c6b14b4c1510_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe
      C:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4536
      • C:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe
        C:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3792
        • C:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe
          C:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4032
          • C:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe
            C:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5112
            • C:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe
              C:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1804
              • C:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe
                C:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2832
                • C:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe
                  C:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:5028
                  • C:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe
                    C:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4296
                    • C:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe
                      C:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4704
                      • C:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe
                        C:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:228
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1E6A9~1.EXE > nul
                          12⤵
                            PID:4656
                          • C:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe
                            C:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3104
                            • C:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe
                              C:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:744
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{3EB61~1.EXE > nul
                              13⤵
                                PID:1936
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{232D7~1.EXE > nul
                            11⤵
                              PID:3060
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3D31C~1.EXE > nul
                            10⤵
                              PID:2576
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DA3D4~1.EXE > nul
                            9⤵
                              PID:928
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3A4E6~1.EXE > nul
                            8⤵
                              PID:3008
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E4979~1.EXE > nul
                            7⤵
                              PID:688
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1026B~1.EXE > nul
                            6⤵
                              PID:3352
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3895E~1.EXE > nul
                            5⤵
                              PID:3556
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{77BBB~1.EXE > nul
                            4⤵
                              PID:2300
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F266D~1.EXE > nul
                            3⤵
                              PID:1192
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4668

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{1026BF4C-9AA5-49f4-808C-5748CA3FC708}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  3e36ecd92451e307baeae7b6b8fb07ef

                                  SHA1

                                  123bfa443f77bfde3c15916ffc6fb8b695691f6e

                                  SHA256

                                  52492fd82c5b81bc8be2f1547ace31cf28258b8c2aba83a0b0078b8fef884339

                                  SHA512

                                  360ae5d80938dd9dc7c71a8f6db33f13e81ac1041fe986fa6accd1a8b9993b313404afe9cf1021059924b8369149c57e407895713e772f3f3fcacbfab000b304

                                • C:\Windows\{1E6A9649-9B9B-4678-B73E-65452D3743C9}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  e1cd6b6e7d40fde9f0a1d4b659213e9b

                                  SHA1

                                  2c13b50c685e2bbc1c120a9f99207003ab9634e3

                                  SHA256

                                  481cb89e020e16d5f2882a779d805045bc6242802e8c5b4c5f6d7e21d799fc5a

                                  SHA512

                                  c70a1dea1831d4a59f1089156e5b3979900c169ae82a02f02f2a087782bc3a4781c8aee18ad5b5dfb7a99ccc8b90d334cc6e1da621e359b2718100c75c941048

                                • C:\Windows\{232D7503-B1ED-4c04-83FB-B51344DCA0A2}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  d6f674d8b523fe00544101181c35d5b9

                                  SHA1

                                  6b6ca1f3eb50e60d7726623e27862788eaff8f34

                                  SHA256

                                  027899949411867ed89758ea042ead3c9080fdeb558cedd14f2461c5b3940381

                                  SHA512

                                  c7ed6a2bbac055eab204d06faf8df9c1e6ed6f2101c03f178ad5b1f7536f5498bf511a1ff3dfc6d39497a119753bb44d8bc53b27e0677a5175b9286b4c83b97e

                                • C:\Windows\{3895E6C9-4DF4-43ee-B044-CDF51130C9EB}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  952f9f90566f5210d1ee8a65189bdfe1

                                  SHA1

                                  e8a1c1dc022ea6ad248179cf7df3a215d63b8f62

                                  SHA256

                                  38d84a713fe210cf74dbcd6774d80244ca1997b2994b011013151851463bcfd9

                                  SHA512

                                  62bb2d94a5930112990858c26357d381a9c8c8d86887fee9c9c07983ed78475a808e384044a1621eaff52d068bde00a6e641cbc67af41b8058051f0d4fbc4490

                                • C:\Windows\{3A4E68C5-4088-4ff6-AF52-DAAF9DFEE2CA}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  6a588c18806ef95b02396a50da82aef1

                                  SHA1

                                  59f6090eabe36a7c587398697666b838273eea41

                                  SHA256

                                  ef6b4280a944d88e31d00cec8fd33d841f5804a042d4a5e7497aeecd152d73d9

                                  SHA512

                                  24a0fa6aa8e69ec6970f92344c3ca35cc1fae425aa69b1edd46fddc5ca722e2ae6b1420a24a6abb6065e2b4ce423c085147e8ae9fde34027869c485ebf493abf

                                • C:\Windows\{3D31C787-CCDA-4fc2-A18D-1C0E1B5B94D4}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  5846767be6a5f495a4c04aa3c9128396

                                  SHA1

                                  b0c449ad07d00b6a97bf3469966cfd037990f0e6

                                  SHA256

                                  8d5a0dd41cdcde80c048dd899f647630956bcc2c126b83a16cc231dce7ad5773

                                  SHA512

                                  ae42e27f07e33ba93073ad65931f60305287bebfb12aa56de04468b6052ed4da7dd001dee27de41b24e748056a5b5af11480d9a60610bfbe344a9bb651a7afbe

                                • C:\Windows\{3EB61BDC-8342-4f81-85D3-3B3FEF97BE15}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  fb6b264b525654765b2c1f457e0d8022

                                  SHA1

                                  9010302e223b6e40355e46aec50a6bcefb137dc6

                                  SHA256

                                  2a3822e92a250d4255934523de64c7976ddf2d742dff8aa8f967b29e579fcd12

                                  SHA512

                                  af141c3a7c6b4ade5cf007d7ac100a8c9c4886a6a650d8025fca21543011ec5e12b3b0173e689af0be3123248b1b06060549e20f89387359a7279edb911d58ea

                                • C:\Windows\{77BBB130-E0E0-41a6-B1CA-18AE497CE8C2}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  361f7c5f29f06de7c37ed5c15d54b217

                                  SHA1

                                  d7f67bfb0cda66d542953efdaf48645ab8c29b45

                                  SHA256

                                  63638b334c9bf5d21cbca2894a5821ff06cba02ef863871e32af9faf7916e739

                                  SHA512

                                  9e22991a053c299883761efdf814e8b1ddbbb6d9033eb615d07b5a7a18dc4fba229bbf89acd1e5c96003bf6bc2e3e1b840cbdadfef55afbcafa709e0a2c9b5bf

                                • C:\Windows\{AC64D56D-B399-4e4c-8B8E-FBAE45626CE6}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  15b7c1d914c732aeed202ed52537dddc

                                  SHA1

                                  01a27d030a63469a1f6f6f821604c225981b927d

                                  SHA256

                                  0a60c76ca9959b08917e6aa304223f6f5bc6c0274f6fde9648d14e8b8dd48455

                                  SHA512

                                  dff6a195bfd8f94892e43bf9edc39b28298ea47059196e04b4460da7013713a6691074ee00de7c850cf95eb9c5199d2bed41e2ed08d26ca85948834a365b8e6a

                                • C:\Windows\{DA3D49F7-E391-4bed-BBAB-3D16837BD539}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  11fe30d639e4e7d16b8f03aabddcf3ee

                                  SHA1

                                  7bfa864f94ba6e30fb72fe1d6e543cd19fc10cf1

                                  SHA256

                                  7be155114e1604727b9a3fe239ed8361040578d178b404f7a04d0cab2eccde14

                                  SHA512

                                  c45b6676de7656f8dc358d79471269e741bdb3007166e1b5cf95866598fabf807f91fb07e6a32acc8e751aca3dda4e444f5a19d9bd2046d5c8a7f6f9ee30518e

                                • C:\Windows\{E49795CF-FBB6-423e-BC0D-20C1EB14DB0E}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  993af31ebb4f83b933b8070d3e3720b1

                                  SHA1

                                  4541eccb0b041d1158c9e45b621740443137c99f

                                  SHA256

                                  e9fba739acf5f6ded67d072623e0b5201cf4149b55dd9cd72d35d038fdc626bb

                                  SHA512

                                  826f29a87cce002b3d615724776ffb251342fd9f2a05982f2752ece7d8179b2d1026de2bf801d9d87191af38c81a5df152a67960ca1b73a483f8c5c71b276c03

                                • C:\Windows\{F266DB23-2B74-4366-9E45-BAAC25CA166A}.exe

                                  Filesize

                                  344KB

                                  MD5

                                  ed34b8c59301cb61ab541173682f6cd6

                                  SHA1

                                  1ac377ebc438f99eafa5eb45c24f1510f4c7c6ad

                                  SHA256

                                  f70912244a0d5f26e38e188a02b75e69c20604614c89e0126b9b709954747d95

                                  SHA512

                                  2b8ff540312b217f58ed40148c5371e3cea633db92926f38acfb16a23d2c858e24659ffc52e6ee4c2c63dc9355e0e07d63c8302a9dabcddbb731a51e139a2368