Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 21:40

General

  • Target

    2024-03-06_6538f3adde737517d34a8746dadeaff7_goldeneye.exe

  • Size

    192KB

  • MD5

    6538f3adde737517d34a8746dadeaff7

  • SHA1

    34795b3256e1c1cc3f214b77a65b97e259844822

  • SHA256

    7ed34929829fd3d141c5c67d69906b1264fb982f4b88d7db033ddd0269d5d8a2

  • SHA512

    0926e6dc2274144ca76f5e3e6c315ab24c50e9e52cfc8a1c14a7fd4dce551d0ef974713f19afc8f325a6db52c8209b311d13dbc4b526f5f28b4501887a1e9822

  • SSDEEP

    1536:1EGh0o4l15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0o4l1OPOe2MUVg3Ve+rXfMUa

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_6538f3adde737517d34a8746dadeaff7_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_6538f3adde737517d34a8746dadeaff7_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Windows\{3EC341ED-5181-455a-A4B1-6F2ACB6921F3}.exe
      C:\Windows\{3EC341ED-5181-455a-A4B1-6F2ACB6921F3}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\{25012ADA-C706-40ca-B6DB-A61EC7B1808B}.exe
        C:\Windows\{25012ADA-C706-40ca-B6DB-A61EC7B1808B}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\{51C0F78D-9792-43f7-941B-2BC01A1623AD}.exe
          C:\Windows\{51C0F78D-9792-43f7-941B-2BC01A1623AD}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1960
          • C:\Windows\{F7B2DB51-7E45-4af9-8473-22968451A269}.exe
            C:\Windows\{F7B2DB51-7E45-4af9-8473-22968451A269}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Windows\{5F9D5E00-207F-4582-AB2B-DEAFB03A7F2A}.exe
              C:\Windows\{5F9D5E00-207F-4582-AB2B-DEAFB03A7F2A}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4740
              • C:\Windows\{20D734D2-ADBA-4922-AD2E-7112FD9561A1}.exe
                C:\Windows\{20D734D2-ADBA-4922-AD2E-7112FD9561A1}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4520
                • C:\Windows\{5AE42187-EA91-413f-A7A3-3516516E7624}.exe
                  C:\Windows\{5AE42187-EA91-413f-A7A3-3516516E7624}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1092
                  • C:\Windows\{4ED21DB7-2C0D-4e06-B8C3-611B4DB32C35}.exe
                    C:\Windows\{4ED21DB7-2C0D-4e06-B8C3-611B4DB32C35}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:464
                    • C:\Windows\{D18C5B44-8C99-4527-AB95-94ECA545EA70}.exe
                      C:\Windows\{D18C5B44-8C99-4527-AB95-94ECA545EA70}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2392
                      • C:\Windows\{47936621-61B9-496f-9455-1F9913A6BFDB}.exe
                        C:\Windows\{47936621-61B9-496f-9455-1F9913A6BFDB}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4036
                        • C:\Windows\{25DD2715-0465-41f1-877A-C42C36D00E40}.exe
                          C:\Windows\{25DD2715-0465-41f1-877A-C42C36D00E40}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1180
                          • C:\Windows\{B7A1649D-ADA6-4ec8-8FE3-080B2BC45AB6}.exe
                            C:\Windows\{B7A1649D-ADA6-4ec8-8FE3-080B2BC45AB6}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4756
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{25DD2~1.EXE > nul
                            13⤵
                              PID:728
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{47936~1.EXE > nul
                            12⤵
                              PID:4940
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D18C5~1.EXE > nul
                            11⤵
                              PID:4432
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4ED21~1.EXE > nul
                            10⤵
                              PID:1224
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5AE42~1.EXE > nul
                            9⤵
                              PID:4304
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{20D73~1.EXE > nul
                            8⤵
                              PID:4420
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5F9D5~1.EXE > nul
                            7⤵
                              PID:4556
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F7B2D~1.EXE > nul
                            6⤵
                              PID:1832
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{51C0F~1.EXE > nul
                            5⤵
                              PID:1136
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{25012~1.EXE > nul
                            4⤵
                              PID:4016
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3EC34~1.EXE > nul
                            3⤵
                              PID:4624
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2280

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{20D734D2-ADBA-4922-AD2E-7112FD9561A1}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  8dce00e8684f0821d9ec26ec614d6138

                                  SHA1

                                  7f90d8907f0a2ed0fcbfefa8c5369ce0535b6cfc

                                  SHA256

                                  f9c815c45d7237f2deeea26d36787e65953d720f7562f1e7a10ef6f076c4796b

                                  SHA512

                                  7fd6c3a7212385a0583a9067d522b0a73079be551691ab17a63f628304d1009ada87d6c56b514a0c1d64c9255687b45a49b8a1eb3f8e2cd288b909c5b23b30ad

                                • C:\Windows\{25012ADA-C706-40ca-B6DB-A61EC7B1808B}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  4c16eb97885a26e87c0192458d56adbc

                                  SHA1

                                  df310e0305a4a1d07b80de8b5bd60f7fe66c0b47

                                  SHA256

                                  837f39ecf77ca0e2a24977cbb657dff1bd3a477976d32cef5baebcb121f301f0

                                  SHA512

                                  75218c065aa5d9f5ac24339a50aeaf647ab54e4059dab4826d6e2d2b5af6678e7786029a6ba9c4a5a993375266ff44a800fa837b2ee3e55e3c8f30f1eb31ff28

                                • C:\Windows\{25DD2715-0465-41f1-877A-C42C36D00E40}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  fae64adfab34eb86f8cdc69fcd1eff74

                                  SHA1

                                  5a6855e0f3f35a8987b1f408e015b181e00b86c5

                                  SHA256

                                  970049f5efe7286a102f9327d47e3ffa3145e5280b89c6909309a57c337dc182

                                  SHA512

                                  c529760b1634989842cbeffb65ded68bbdf6ad7752724924ea80ec4f8f28e63ada5d7455e72ed9446efb4ab067801e3dfc84adeec734fc2ecab4fde252be6dba

                                • C:\Windows\{3EC341ED-5181-455a-A4B1-6F2ACB6921F3}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  4d2dc2c4adae79eb6984198d262bc481

                                  SHA1

                                  5fe259fd9137595aa2ea4c8612b000d2ea7c3e68

                                  SHA256

                                  35841c1e6ecfc07f20330bdd8f422af34717319f05ac0f3159f1c8954244e1cc

                                  SHA512

                                  eefc4992ac15bab96a18e9a6bdde19f788486e680c498695356aac8f1fa8532ac2559c457397f792604ac2a12fca77300afb84ed25641467a3104b0f7859d29c

                                • C:\Windows\{47936621-61B9-496f-9455-1F9913A6BFDB}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  ec6f088603fd71dab5d593199f8c8f49

                                  SHA1

                                  032624f267d939fd817375f3c3f524d9eb7fb2dd

                                  SHA256

                                  2491884f30467d84ee92563887526f50ce4f95597308c78126a88e97b7a9c045

                                  SHA512

                                  ec55d5f62f276302a9b467a7fd172c7abd6333ead14680ed6ae1f6cb9f7cc695f746d10f48a89e38dd7396396c9f5cad4083b450312c2d7367eb47003e815c47

                                • C:\Windows\{4ED21DB7-2C0D-4e06-B8C3-611B4DB32C35}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  f9395f14ebc2d33c4bb6a9dd44ce70da

                                  SHA1

                                  c5feedd4d273ba8828a2723f9f4cfbcaf3d72dee

                                  SHA256

                                  385a4878e9c9335047fe3d1396685e08cad48eac766e7a2ee163333518864f21

                                  SHA512

                                  d8892941fcdcf592223bf125b6400e0733a08470e3c19ead1604a7a012b5c250424ac6c829b552ff27053d0c77bb647e0354113b9e1753468ed353c4cd1a46d1

                                • C:\Windows\{51C0F78D-9792-43f7-941B-2BC01A1623AD}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  f583db051a7e83a7af82ae8a1daca26c

                                  SHA1

                                  748a029dbd26f24c3452d46579b0509482e76200

                                  SHA256

                                  e6466a7002d148535d00aec1619e0d6084df20f852f5a3f17ba7b41b04095a01

                                  SHA512

                                  0b4b68ef4800d0ef73a3a8373ec1c3e9ee288dcf006835d9169bd209771f36d67456dd4a87c09ee9fde4642ae7edacc4337293ad197efc3a5cf5ba1938d21779

                                • C:\Windows\{5AE42187-EA91-413f-A7A3-3516516E7624}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  fcfa27497297d52e8f0041b4c7a46bce

                                  SHA1

                                  4f18ccf1a8d601a04db5d27ea42c9276f66f4d9c

                                  SHA256

                                  0fdcbd7557a897f0cbec3a7033b9c6fee035fe061875e1afeaef68845b338447

                                  SHA512

                                  01bc7e07d5bbb4437b9675a6f387f78ae4ed9e1dd983eeaa0711a0e8cbd9cf9029160b3962614f18593503943ecb06f36c3ae55465b15fb7dbd9a739e34d1066

                                • C:\Windows\{5F9D5E00-207F-4582-AB2B-DEAFB03A7F2A}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  9909651bace3b2b73ffd19dce0565dcf

                                  SHA1

                                  38bfe4568aba6160268897256f911c9aa67fd6c1

                                  SHA256

                                  66e7c47bc57c5d8b1550b9c159cf064f66da66277b4017a97eba97f0350c2240

                                  SHA512

                                  4b532d6a47e4b2e3accdb2ed726232aefbd3d521051aae1c427048e9831d5800bfc61fe82f06efe898aa41eea64eab64621d7d22c9a0163149a892e4329f64d0

                                • C:\Windows\{B7A1649D-ADA6-4ec8-8FE3-080B2BC45AB6}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  1501c25257208f89acb611922e7e4606

                                  SHA1

                                  15d6d3c5e873b05e907f604fb0d54ca433cd2fb9

                                  SHA256

                                  7db5205a23f468c4841fbec4e46a868627a9d89612f60151bca4f51c1fefd8a0

                                  SHA512

                                  2fd59e4b8b04ede702cff61ecb6402fcf36ec25366141d0b5877b9ca242fe292df2d6045bc5a8a106aad4138b8b0bf11682b7bee29a3669938de10f3e7f87d8f

                                • C:\Windows\{D18C5B44-8C99-4527-AB95-94ECA545EA70}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  6288115281f22409cc297c3f31a904b1

                                  SHA1

                                  c2cabfc2dc75ea87fa886dce404595b979575397

                                  SHA256

                                  801a86ee52ea5e1da16c3ddf156f972cef44d72deed99497d9481b731d3777da

                                  SHA512

                                  e2d62737f346f4f4673e543d2378f64d95a26f4d96426a38ea028235a99a4a3978206e1514323aed9cfc7fd27fd8cefb45d7a057e8133daccf3577c1d349705e

                                • C:\Windows\{F7B2DB51-7E45-4af9-8473-22968451A269}.exe

                                  Filesize

                                  192KB

                                  MD5

                                  d089c40aaa3187159dd892846fbba1a3

                                  SHA1

                                  3512c42bf274ed2badad2f8381db3e49915ac1e5

                                  SHA256

                                  b97e42420dc8ecfcbab9d0e5bf4ba0c0932a81bbb90645bbb89dae898e69a6ec

                                  SHA512

                                  c1ec8e2caa3fc61184a5bb77cb64c289748262c9e84aa3a215d00ae5bbbb65918424f83cf1d39a1bff39b7842185f6403d98977dca00c06665c62f4b4cc25dca