Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 06:44

General

  • Target

    2024-03-06_e77cc1c5995b8d825389c4fc17ce9778_goldeneye.exe

  • Size

    344KB

  • MD5

    e77cc1c5995b8d825389c4fc17ce9778

  • SHA1

    a22db6d7cafee3f30e4dd8271f8ec01914e7653d

  • SHA256

    a76b0de94fdefedd7e05cb2d870b0a4e1ba1b00decce2f1a87bd030f00b2d9d0

  • SHA512

    2356bd2da0bd368774e2cd096d573d74e63364c9d938408fecc1c84dd57d953b9e73f56a26358e0f530c907b8b7abd172320454cb680e3b3993fe2e8e7b251e4

  • SSDEEP

    3072:mEGh0o2lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGUlqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_e77cc1c5995b8d825389c4fc17ce9778_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_e77cc1c5995b8d825389c4fc17ce9778_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\{20AFFC33-172A-4694-BF2A-F6DE632DB142}.exe
      C:\Windows\{20AFFC33-172A-4694-BF2A-F6DE632DB142}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\{80EC1CCB-0427-4963-ACCB-6ED13ABFCF6F}.exe
        C:\Windows\{80EC1CCB-0427-4963-ACCB-6ED13ABFCF6F}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\{66105A93-C2A3-433d-922C-FD416BFA2B68}.exe
          C:\Windows\{66105A93-C2A3-433d-922C-FD416BFA2B68}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\{CBDD870E-F6E7-4c46-925F-D915979FC838}.exe
            C:\Windows\{CBDD870E-F6E7-4c46-925F-D915979FC838}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Windows\{F357E3BE-F668-4507-A386-7A5F2EE17F70}.exe
              C:\Windows\{F357E3BE-F668-4507-A386-7A5F2EE17F70}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2796
              • C:\Windows\{920EF768-531F-46c6-ACB9-17B9C9F3C2EE}.exe
                C:\Windows\{920EF768-531F-46c6-ACB9-17B9C9F3C2EE}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3040
                • C:\Windows\{427A7E20-D8D2-49ac-BB48-9E6F45146027}.exe
                  C:\Windows\{427A7E20-D8D2-49ac-BB48-9E6F45146027}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2368
                  • C:\Windows\{37BBD1C8-1856-4419-ACE1-308AEB559595}.exe
                    C:\Windows\{37BBD1C8-1856-4419-ACE1-308AEB559595}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1892
                    • C:\Windows\{10E17A03-6DDC-4d97-AB98-F1C42386DA40}.exe
                      C:\Windows\{10E17A03-6DDC-4d97-AB98-F1C42386DA40}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2304
                      • C:\Windows\{B39B83DA-2B61-4bff-8969-6918948A8678}.exe
                        C:\Windows\{B39B83DA-2B61-4bff-8969-6918948A8678}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2376
                        • C:\Windows\{32741591-5403-48c5-B617-8180502290F3}.exe
                          C:\Windows\{32741591-5403-48c5-B617-8180502290F3}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:708
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B39B8~1.EXE > nul
                          12⤵
                            PID:584
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{10E17~1.EXE > nul
                          11⤵
                            PID:2128
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{37BBD~1.EXE > nul
                          10⤵
                            PID:1260
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{427A7~1.EXE > nul
                          9⤵
                            PID:1440
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{920EF~1.EXE > nul
                          8⤵
                            PID:1956
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F357E~1.EXE > nul
                          7⤵
                            PID:1968
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CBDD8~1.EXE > nul
                          6⤵
                            PID:2828
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{66105~1.EXE > nul
                          5⤵
                            PID:1876
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{80EC1~1.EXE > nul
                          4⤵
                            PID:2372
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{20AFF~1.EXE > nul
                          3⤵
                            PID:2848
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2548

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{10E17A03-6DDC-4d97-AB98-F1C42386DA40}.exe

                        Filesize

                        344KB

                        MD5

                        c1b17de8d1c90efbd14782cafe8ea4ec

                        SHA1

                        6a8a033eabe9288e5de39b492c5dc931165e0e3b

                        SHA256

                        92d55a19c508007b635701f35302c428e8ed485cb75b1052e5a0dff58b5c4cad

                        SHA512

                        68f3373cd0d8e8c19e25e3c47151f68d5fab785a98cb247eba92d4e0f807d645c5080fffd238c69904f99f9bc006fd3be0789fcde5bd84872f534a1e1373d2a5

                      • C:\Windows\{20AFFC33-172A-4694-BF2A-F6DE632DB142}.exe

                        Filesize

                        344KB

                        MD5

                        6a064dcdeb5efe1b8cef9c4d8c49e233

                        SHA1

                        1278aa3cc408bec3db975b44a3fb17f7cc2bc04c

                        SHA256

                        f2d991fdbed8be6de04290e7f012ecfe436c4f3106cff5ebbdba164d40897727

                        SHA512

                        e05cc153683976d86c29756fbb8c7b6513bdd36f8d38b63afe474bd3cfef74fbb2909f9ce0a687877701de1cde0f9379d92ffb2897c2fc97b8a38a1815f7e6e4

                      • C:\Windows\{32741591-5403-48c5-B617-8180502290F3}.exe

                        Filesize

                        344KB

                        MD5

                        2054048f901909274853f074a207e9b9

                        SHA1

                        437edc7b9a616f4e38f92e9f787d424680026c3a

                        SHA256

                        d245fe4f8418afd33a85e43f6c1e7bd7cedbbb89443561ce0952713b5ef699c2

                        SHA512

                        b22f4798f0c1db68029a5d752e0cb5b6794134fc4f243735f05404c9d0630fe2b68dc4f79fbd407ebc9947ded94339b301e13835239e6b7161954fd872b5eb39

                      • C:\Windows\{37BBD1C8-1856-4419-ACE1-308AEB559595}.exe

                        Filesize

                        344KB

                        MD5

                        d200aabc4d429e31515a6859f4891705

                        SHA1

                        1058a511bd5d157e61982608d75e966b4eb70bb3

                        SHA256

                        cf51ca12648caaf1dda818ceefd0c64d99183514c83109eca5b27675265ca007

                        SHA512

                        880be32312895e6608ce56bed2ca8e2f76498976b6b0528309c2c6db69483827f85869a64c6b5422b5950b036d2f6270a93260ee29100470498e568051f704da

                      • C:\Windows\{427A7E20-D8D2-49ac-BB48-9E6F45146027}.exe

                        Filesize

                        344KB

                        MD5

                        e4d44c0029280b637fb628c4a5404e1b

                        SHA1

                        cb96e3adee098b84801b97e0a572a1885ee447c2

                        SHA256

                        3714dfac7065353be42e88041bd61ee68b1dd869f9aa1ab382c9171f11742f32

                        SHA512

                        0b8204ce5ba7514b193fc00532cb2daac0128d4c9fb2c71d2aaeb394d132a33eea88f43e860af8299ab74026f4fd4f86d70cae01796bbda85bf25c7716005947

                      • C:\Windows\{66105A93-C2A3-433d-922C-FD416BFA2B68}.exe

                        Filesize

                        344KB

                        MD5

                        76c24881edb6d245719ead6be8d05433

                        SHA1

                        35c4c0a57072011b3e1ef8afb4d4cf3b7e13f853

                        SHA256

                        7f8a489c90aeee14fdf3ef83809771c74b5e15c4225dd4b9c367947d70a20bad

                        SHA512

                        75ac920aeafddfe5bdf67904a24b1081e1dcb1e767c975d7092f9532b46d5fbfe9841ac401676be421790c295afad8ffdc4e89c5abe0853ab5a4cbc518df4a70

                      • C:\Windows\{80EC1CCB-0427-4963-ACCB-6ED13ABFCF6F}.exe

                        Filesize

                        344KB

                        MD5

                        32ecab59f155715e349cc72a4ed4f881

                        SHA1

                        7149edb21b023bc4694938e258b49638b177bbef

                        SHA256

                        e543438efc57e4e3b0bb56355b8bc348a54e7a2e9021d935e891454e4c6de6d9

                        SHA512

                        16f2e04c32fee13834a2c887e1bf51f4d8fc008ef4764385198512836a35474c93e4a42e5f1ca5281a2f0a159b3f22d87cac5ccaa9fdaa5925745cd29249ede6

                      • C:\Windows\{920EF768-531F-46c6-ACB9-17B9C9F3C2EE}.exe

                        Filesize

                        344KB

                        MD5

                        d147757257a1903c9a6ed9e5c71d44d3

                        SHA1

                        e2801f7534179111239d0bad37e3e3b2889cbe61

                        SHA256

                        e3d17d2b988cbe9e3528efbe57132943f5053f994cbf7d82c0eb0ed95b52514c

                        SHA512

                        5de6c165999f9c921b2c52696030205e7206bab7eb8642b822be7ba149b2755c347d17c4850126275ba986324ca0f5fcedb4ee49d15f31317d9661a6f4f3cf34

                      • C:\Windows\{B39B83DA-2B61-4bff-8969-6918948A8678}.exe

                        Filesize

                        344KB

                        MD5

                        a95096b38ef1e0d76e8cef275147deab

                        SHA1

                        6a3c3adc26acbaca36a2a197a25725086b332554

                        SHA256

                        65162092d8a4a949e69c8da0991ba6f022323433ffab332081b246cea1e6d4c5

                        SHA512

                        221e407b59dcec7d6b96e4774fcc5ae4e65574031394ad8484e9ad450e74d0f01d6d55e4081686ba3407fddc62e5f4d26c182cdc85d3c0106f1388596d38f21c

                      • C:\Windows\{CBDD870E-F6E7-4c46-925F-D915979FC838}.exe

                        Filesize

                        344KB

                        MD5

                        10461871e7d30709fc65857005aa6ef1

                        SHA1

                        28104ce234d92fdc9dc7bd0571fdb476e68e57a8

                        SHA256

                        c75a0617d780ed0613fec9f44fc903660f4080caec6eb8b86f557d0f89e80be0

                        SHA512

                        1ecb6eada3e5ff21ff86596790518b4c646b7409c3b941950f6afb8359bab0e2742f68d3bd1f632e68abc354c4f35a4b6166b07832ff0fdec1a78a996fb24a88

                      • C:\Windows\{F357E3BE-F668-4507-A386-7A5F2EE17F70}.exe

                        Filesize

                        344KB

                        MD5

                        549c383cfc6fa6cceaa8bba6fd2a9d59

                        SHA1

                        3baa09829f4e91d57f2c151725392d90bdce1fc9

                        SHA256

                        22df64278e8bffbc187d8dd52e5ccb189cb287d0dddc62cb80094ab5614b326a

                        SHA512

                        a47a545b94d438873b4db647bd2a59a321ea0bc6724df45c4fdac87d908140e8d1047c69593d3bef209640ebacc907139936f9204ce9c17d322ba1e424ea9e80