Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 06:43

General

  • Target

    2024-03-10_f78260489f4f9b48574ba079ba7acff5_goldeneye.exe

  • Size

    372KB

  • MD5

    f78260489f4f9b48574ba079ba7acff5

  • SHA1

    f8f7de60ca41435c62b29e04b00399a3d1a20b56

  • SHA256

    719811872fcbcc1fd4a0d2d550e4b55bc0cdb4047b02ae201ffc772282c5b22f

  • SHA512

    44d11ddb279463dc469e00b4f3ba51171df882d98ce4a20226ecfc25ad493c65d1b5ca4db165072ac9e89ae4b64cb1dac454a9b6129dbe1463409115f51ab942

  • SSDEEP

    3072:CEGh0oylMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGMlkOe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_f78260489f4f9b48574ba079ba7acff5_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_f78260489f4f9b48574ba079ba7acff5_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\{8BB89CF7-AE48-40c2-BC2F-642ECBD1E6F9}.exe
      C:\Windows\{8BB89CF7-AE48-40c2-BC2F-642ECBD1E6F9}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\{DBFD5244-15FC-4cb3-A78C-EF57E97ADA07}.exe
        C:\Windows\{DBFD5244-15FC-4cb3-A78C-EF57E97ADA07}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2476
        • C:\Windows\{FF11B3FC-FED2-4277-A68C-C2D8FC7C793C}.exe
          C:\Windows\{FF11B3FC-FED2-4277-A68C-C2D8FC7C793C}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\{CE884AE2-54A5-48a1-A12E-5B4E9D5D2AFC}.exe
            C:\Windows\{CE884AE2-54A5-48a1-A12E-5B4E9D5D2AFC}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2440
            • C:\Windows\{525856C3-AB38-48a6-9F73-78E44F4A0474}.exe
              C:\Windows\{525856C3-AB38-48a6-9F73-78E44F4A0474}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2040
              • C:\Windows\{0AB4CE6C-52B2-4c92-B903-35FE29AAE844}.exe
                C:\Windows\{0AB4CE6C-52B2-4c92-B903-35FE29AAE844}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1080
                • C:\Windows\{4516DE0F-42B5-4f84-B2EC-D3CA1D7302AA}.exe
                  C:\Windows\{4516DE0F-42B5-4f84-B2EC-D3CA1D7302AA}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2308
                  • C:\Windows\{37BA95E4-A218-4820-B176-E61F6BFB30AA}.exe
                    C:\Windows\{37BA95E4-A218-4820-B176-E61F6BFB30AA}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:956
                    • C:\Windows\{61FA423E-3D61-4449-8756-C7548938EF98}.exe
                      C:\Windows\{61FA423E-3D61-4449-8756-C7548938EF98}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1348
                      • C:\Windows\{0E6DD258-0EE7-4330-B2B6-EEB55B48E93A}.exe
                        C:\Windows\{0E6DD258-0EE7-4330-B2B6-EEB55B48E93A}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2716
                        • C:\Windows\{FEAB6CDD-A9C8-42ae-9D4D-79094BD7D20D}.exe
                          C:\Windows\{FEAB6CDD-A9C8-42ae-9D4D-79094BD7D20D}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2212
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0E6DD~1.EXE > nul
                          12⤵
                            PID:2056
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{61FA4~1.EXE > nul
                          11⤵
                            PID:2200
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{37BA9~1.EXE > nul
                          10⤵
                            PID:1248
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4516D~1.EXE > nul
                          9⤵
                            PID:2356
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0AB4C~1.EXE > nul
                          8⤵
                            PID:1644
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{52585~1.EXE > nul
                          7⤵
                            PID:1088
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CE884~1.EXE > nul
                          6⤵
                            PID:576
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FF11B~1.EXE > nul
                          5⤵
                            PID:2840
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DBFD5~1.EXE > nul
                          4⤵
                            PID:2536
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8BB89~1.EXE > nul
                          3⤵
                            PID:2560
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1936

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{0AB4CE6C-52B2-4c92-B903-35FE29AAE844}.exe

                              Filesize

                              372KB

                              MD5

                              b03fd2d23d870f8bb7443918d1752295

                              SHA1

                              7d14cb0a21c0d3ab10a23f9f0a20dacd52ec402f

                              SHA256

                              4c017c5ccb18652fb41ce6b11fec398d3035463a94bd0e1fe9b38f5cbc2a11cd

                              SHA512

                              b4d52e49a5b2ff1f63e9433b1f8b4e80690d36e45fb07d09a3eb5996c22ba7fcde557ba6c2add5403cb25eb9399e74e1a59871f320c958740c44d80c990a6caa

                            • C:\Windows\{0E6DD258-0EE7-4330-B2B6-EEB55B48E93A}.exe

                              Filesize

                              372KB

                              MD5

                              7a5bad633969edf1ed135314860cffbd

                              SHA1

                              8b17c21c6cc3cba5a93f9ef22043040b59ca5da5

                              SHA256

                              b2fa784336f53035e618b67ba18d4055f3bf334b1c86e0265006c5326486c8f2

                              SHA512

                              8ebc186d2a0a914ea96c3b1a88025f7b0d132a7b08057e731a5268034074ff4e708247ea343474620a0e1564ae43dab99a1a0a3ded8f7294d05e7458a033cfe9

                            • C:\Windows\{37BA95E4-A218-4820-B176-E61F6BFB30AA}.exe

                              Filesize

                              372KB

                              MD5

                              1aa35a4f5a154ef0a15a6293a11bfb1a

                              SHA1

                              8bec233fe44bbba07120a16939c6621bb7ecd75e

                              SHA256

                              8c327b18d84b4b3393a71b24bda83a99e1230470756595d898e0af7174883ccd

                              SHA512

                              abc6494d2acf70e6ba2772f234f2e3b9cf00f1f6e3ed9591743ac28f386d71e624f4753aa85f9fbd51bddfc63655d9b3d144a98899d976bcbf2533e684c69294

                            • C:\Windows\{4516DE0F-42B5-4f84-B2EC-D3CA1D7302AA}.exe

                              Filesize

                              372KB

                              MD5

                              64a67f149659a6dbe07f9730de6c314f

                              SHA1

                              23a18f47e98c29a1b3990bbcbbce591a89b5d5f7

                              SHA256

                              9637ebe4f4f0fe6b1d1ef2554f7cc7533a4e0c7c0d62535e2ab3f86b1c38756d

                              SHA512

                              bc16bb39af0384a9eb0faa36da1e923ef1de5b97580645f55ac8ac282ace8dfe4d088ee01d22229403f54d4f7f0a8ea0107d135fba165e9946f604009b2b0a13

                            • C:\Windows\{525856C3-AB38-48a6-9F73-78E44F4A0474}.exe

                              Filesize

                              372KB

                              MD5

                              57e55a8e8363675ab5697288626a8627

                              SHA1

                              15bea7814a04a8225f63ff54c82f869d10ac52e9

                              SHA256

                              ebabc2787b6e36240ba2a81ba3454a34a726315bf53b12e3f98fe194a6f06a3f

                              SHA512

                              0279a74fb1ffdecbf1ee18d4ef49a0961ef91aa3c3d97647a168d1c8804539f0bd9c712c5fa4ab48bcff91d5ce438eefbafb6b5f9dbdc7d2ff627f063943ae27

                            • C:\Windows\{61FA423E-3D61-4449-8756-C7548938EF98}.exe

                              Filesize

                              372KB

                              MD5

                              6bb61ef61d813f4fdd091b930dd344c1

                              SHA1

                              0ceb5dd89096685a07a7fad13b7fad73961adc47

                              SHA256

                              7751fa9a9c0ae1dc61e187ffd8160fca1e8ff37f95261dc9adc0fab62bb1d12c

                              SHA512

                              47a29174cb96ce09d3ade0ef56c929ec20a6e5650235073bd1f2158d2404ff225d275655fa35659107bb1d367abf403a81db72475842e93af0338dd926fb9201

                            • C:\Windows\{8BB89CF7-AE48-40c2-BC2F-642ECBD1E6F9}.exe

                              Filesize

                              372KB

                              MD5

                              c7d10f2b2708c4a80498c4d1d7055066

                              SHA1

                              ada35a68b69e84a23a37988b03adbbb972a3fe7b

                              SHA256

                              e97fc9ad8c13fc0e8a90d1beed9c5417ac909607e4c3bdfebd1a261c5fd2ccac

                              SHA512

                              45c796aeead00a3723e5bd9526053f04809c56c7dde57477db081b9d6596f4b600d89ba1983b0c40f668c194072da3c131ce0769bd718b459fcffe9d0c772d8a

                            • C:\Windows\{CE884AE2-54A5-48a1-A12E-5B4E9D5D2AFC}.exe

                              Filesize

                              128KB

                              MD5

                              f12d9becbd738d3213bee0c995790709

                              SHA1

                              2c313788eea574a92297af7e6bc7b34f2c684ee5

                              SHA256

                              dd7f2863f84044131936472d35a0c20a5efe6a978f4eb16afa91dce8d65405f5

                              SHA512

                              f0624bed32d1dd0a9b802430e260ee6af585213983c4b328e71f3264c7e0168f11e1e53cb5f762bfef83c19caee605c8dd4249e5f406b09efacf261dc5eb9e97

                            • C:\Windows\{CE884AE2-54A5-48a1-A12E-5B4E9D5D2AFC}.exe

                              Filesize

                              372KB

                              MD5

                              864b3e132db58123a4b4e175f2e407b0

                              SHA1

                              c42525947ac942b336b6512d2ccb5fd4b0363ee8

                              SHA256

                              83863cacb33231470dcf6a7c872b9e2fbf91c96d204176431fa5af66fedf06f6

                              SHA512

                              917cb666f95fdb7e60f26223be6d11db5c3c608c63288d9df812a00a516f79e3f1b9a8fc71c8e01714016dbbb793f8cf4d606896f33406b1d8c56dbf27606db2

                            • C:\Windows\{DBFD5244-15FC-4cb3-A78C-EF57E97ADA07}.exe

                              Filesize

                              372KB

                              MD5

                              e4e6fe89e1c4290928bdeb3b1ce6ccdf

                              SHA1

                              853acda7b8bb4a29b4b7673581b7abd6a97a21ce

                              SHA256

                              6dd30c1b4b6e19c83df58e172d9f3298c3a89831d7ed684901688608b27cb575

                              SHA512

                              1cc68c7121df1ffb0eb984835b18559463a285ad3166d36745653cc8e3047b10b21d2fdd59c9d702582d1153a60c074012d1a1bfeecf0ce39362552a27347212

                            • C:\Windows\{FEAB6CDD-A9C8-42ae-9D4D-79094BD7D20D}.exe

                              Filesize

                              372KB

                              MD5

                              08ee2dad2274723f5177b9db2395d3b7

                              SHA1

                              0a520fe7508f73ab5e5a0d010ad1ac6544ad45cb

                              SHA256

                              878251b42dc7e14ed6871f22a9f0979951703c20130ddedfe5ad5acebc3a444f

                              SHA512

                              6d463f2f0fd53e4c29fb535cc574d01f50046d6f1aba39a8fc21bec62e762470bc0c32f3f433a17d58a0780a261d9875de4d51a6f0f9681820e965875be0d5de

                            • C:\Windows\{FF11B3FC-FED2-4277-A68C-C2D8FC7C793C}.exe

                              Filesize

                              372KB

                              MD5

                              2c900d594e6e307844238079e350bc89

                              SHA1

                              23561fbf9cedd123dd653012a89da9e5395b54f8

                              SHA256

                              92d1be93717b23622bcb7899124aac11db5e6c5a8b9cf0c80cb92372336fae15

                              SHA512

                              47e9357f88a740faad686548e2e2479e0680ee2415e7f2fe69d02ecd2fd7450ef67597207f77ff832dbb3437f1d34b631fc767a641ba12e0f5b316e58d43448f