Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 23:32

General

  • Target

    2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe

  • Size

    197KB

  • MD5

    7aaeed50d8c3890d64899ce8cb751ca7

  • SHA1

    2418ba5e39bdd410fcaecabcd82180c1490834d7

  • SHA256

    a8700e332976214ae9012a6a0f4c1a8b5bd7549602629e282efb4c5c31106ef9

  • SHA512

    ed22012e227b65e215f33a9442a9ad968fc1b8e378cd811dcf4eb618709d5ef353fc346d4cc9c31c6b045320328e2826e5a03f791b5879f25809e063f9b22e9d

  • SSDEEP

    3072:jEGh0oIl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGOlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-07_7aaeed50d8c3890d64899ce8cb751ca7_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe
      C:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe
        C:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe
          C:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe
            C:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe
              C:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe
                C:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2416
                • C:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe
                  C:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1440
                  • C:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exe
                    C:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2784
                    • C:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe
                      C:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2332
                      • C:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe
                        C:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2876
                        • C:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe
                          C:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1168
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{10CE5~1.EXE > nul
                          12⤵
                            PID:1492
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{56F01~1.EXE > nul
                          11⤵
                            PID:2796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{108C9~1.EXE > nul
                          10⤵
                            PID:2300
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{272AF~1.EXE > nul
                          9⤵
                            PID:1284
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AE8E6~1.EXE > nul
                          8⤵
                            PID:1564
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7C13D~1.EXE > nul
                          7⤵
                            PID:1092
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FE63E~1.EXE > nul
                          6⤵
                            PID:2824
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E2BF7~1.EXE > nul
                          5⤵
                            PID:1068
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0FB98~1.EXE > nul
                          4⤵
                            PID:2728
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D9373~1.EXE > nul
                          3⤵
                            PID:2720
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2732

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{0FB98EB5-CE81-4f99-B771-DC824DE48961}.exe

                          Filesize

                          197KB

                          MD5

                          3cb79330c6096b89afaca88aae0ceb1b

                          SHA1

                          ce416ac1e38422693dd630d0348151da813092c8

                          SHA256

                          8b9532823d04414dd443ae940ae29eda97988b7303058201fc013fb5538995b5

                          SHA512

                          a2ec1a2ab3267705266c9e415bd76ac3bac7e1ccb01bd80a1afd9efb817c4d3560248307973578846d68dff542ac60feebd264955d5abdae162aa9ea2f833167

                        • C:\Windows\{108C965C-9908-48b2-AD44-2108588F6956}.exe

                          Filesize

                          197KB

                          MD5

                          7c4e502dd09e2b05c14989ad994ea0bb

                          SHA1

                          b278d0f0b26ec8b79375e6e58b4e140248389d97

                          SHA256

                          c25a39b6acf0c9bca1c2d0f8bcfc6b7cd51628d2ff4ebae76b42bca99a9f25b7

                          SHA512

                          1fcf628c7b5d8f5fa085e56d4fbab2a76695bdc796799cee3542b6ed6da5199e5a978c5e30d5e36fe4f7fc70cf0ca8830df5e2c1ae719e14ef65415a47220d7d

                        • C:\Windows\{10CE58B0-1727-44b8-A012-3AAD2B384A69}.exe

                          Filesize

                          197KB

                          MD5

                          228c5c5ca401667c60194e257637efed

                          SHA1

                          3e7f1e76f597187cd2006dcf0eceae81b1942b56

                          SHA256

                          46b550be301b4c388fc82999bd738ab4a691b4c925fbe0955d5ae16d9f2a704d

                          SHA512

                          04f5a8801b606a60e345fd0e26e25a947ef2165ac5bc665fdf3c6120adce310adccb2b7a754dbcf9c259c614a9143427e1449ac88048afe4998171d6e4b5aabf

                        • C:\Windows\{272AF77B-F6CA-413f-B921-8D62FCAAF115}.exe

                          Filesize

                          197KB

                          MD5

                          b2d038f8835e1b4bbea6ff8af1ab2f40

                          SHA1

                          e43482e3a52554256a4935c78ef8931a0e7df8e7

                          SHA256

                          bd5fdc041ddbab7ccfd06b82c31304b7048a059b7f530393ea6fda993c4d6b25

                          SHA512

                          e60ee3fca6b9aefb0d6d846498000dfae0020aa854bca141d10f48c93735334555c084217365fa5c410ed02ed589b741694594891b603230d6eb06b2cbc38449

                        • C:\Windows\{56F01383-9D3C-42c8-BB88-0804A9782370}.exe

                          Filesize

                          197KB

                          MD5

                          e103e64aa297a9372418ad6cbe820d99

                          SHA1

                          94680ff8f5847358b258476802608186bed5e192

                          SHA256

                          deaf23542ecaeabb84e1d24af5810df6f68f59a7e226df02a90c3f38c8644915

                          SHA512

                          ef17aa25935ca90c379f3f3af0e456fd18d1d261ce4703d4eaeb2c3ef472a4a408be96c3df658c3519c6b935ab45486ad4b5806317f1ade117f35b906516906b

                        • C:\Windows\{7C13D2F9-FBC1-4ca4-9261-E625954A60EB}.exe

                          Filesize

                          197KB

                          MD5

                          68a5117d8b0be8baca484e7f3461ae9c

                          SHA1

                          ffdf7efea40e33ef6f35a4d3e01d7d206fb98ac8

                          SHA256

                          abc3fe2e1f32f72b0f10477841eac884268e2e385f4308a3f5009007cf1c03da

                          SHA512

                          1e6b933e9d9aba7b8225bf38e96701ec89ca11dd12ed2ed1bfa5e2ffeeab7350e8621d88edab6405add52e14f72d1bc4197e5bdc9e6f99331402343eb2009836

                        • C:\Windows\{AE8E68F0-6844-486e-A1F0-75521A809ADE}.exe

                          Filesize

                          197KB

                          MD5

                          f3e4ac0591f7e90617b2b212242fb450

                          SHA1

                          4c2d71536778df8528b7ba098c57f5ba5af177d6

                          SHA256

                          c0a0b6e39d0fc6b31923b34dc8d0e7b1c9a32765c7a50e7450a8462267de904d

                          SHA512

                          09bd90c4e8b6226919f49efac3e86b01a514f41eddc1b287039f0a92b45d7c92f49d04596312a2ebe5caf638a769719d10774b6f77fc5951352d102a6138460d

                        • C:\Windows\{D9373C8D-9D65-4a0c-9D3A-9DFB5598001F}.exe

                          Filesize

                          197KB

                          MD5

                          cfb7b9050d4babaa3845067e7c18a777

                          SHA1

                          4b602243b5f4810eee7a0e52dfb251a5f6a3cfea

                          SHA256

                          d3acb8744c32a7e41968dcc95d162e0d80148b7999a8dafd1ebaf5445bd7a96a

                          SHA512

                          b2d33174ab7e562c8d846e64cb63f62e68f73df38fa3ce46e29aa11f3f25381681755b0cf4a5d2f2c17664eebf5e2ab92ef7e60fc49648a5b879e25c89786021

                        • C:\Windows\{E2BF719D-F8D6-4b98-A944-D9042A23E65D}.exe

                          Filesize

                          197KB

                          MD5

                          f96955a0705b1b2f3314f86bb7c2416e

                          SHA1

                          0ee1f089c2b7fa9695091d320018579e6741c074

                          SHA256

                          5150fc4481fe6206606d590f29a47b0dd0f1eadee00179eaca6b0681e7fc6b5c

                          SHA512

                          469e183d945fda6f2fd060ed4b9002ce4b6271604b29ac34322618fd09d34ec3c1c8edfe066e5d5118c98061d3098d942fdba322934802bc449fdbe66410e2ab

                        • C:\Windows\{E38C8C63-6DAF-47c4-AF4B-4C66509C4E10}.exe

                          Filesize

                          197KB

                          MD5

                          49b430523755945eef649edbc5a30675

                          SHA1

                          997dbbb2bd58bc814f8b6ccbdc7a96898d15a4b1

                          SHA256

                          0ce609d179ad798dc3e37d0f5516f475adc426dea0e2f54402a074b71fb2a87c

                          SHA512

                          5c29dc0ed3d5faa095741e17f968878c70722123b5a07333156ab77cf87f96175bfa59f1831a342d932eecf63b0ba8364d2611c886929ac89fb6e294abb9776a

                        • C:\Windows\{FE63E818-B3C4-43e5-9E24-5EE5648A5FF9}.exe

                          Filesize

                          197KB

                          MD5

                          5787dd82b4d581d7367be5e1968248e1

                          SHA1

                          96a7c7200f83d08f9f78319d1b65535f9bc325c1

                          SHA256

                          8196b99bcaa4a9f305f3d656f71b13c3a453d4957bac40f38c7374bc8c648246

                          SHA512

                          43efd0b722b7da80041e14381a2e3163f597b8fd182cc6adfb522aa15714df6f6359d72ad8ab5ec545c4675b645336a3d3420e47b06a3742e0d54580e050b8b4