Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 07:25

General

  • Target

    2024-03-11_7c3182f58ef9188a8a807e45b2505b94_goldeneye.exe

  • Size

    216KB

  • MD5

    7c3182f58ef9188a8a807e45b2505b94

  • SHA1

    d92b9eadca12e64d2ed645227e9ad0a0027970bf

  • SHA256

    005a1cf4c6a461f930be9635339ae9428fc5bbfd6317a0de6097b08fc856fd04

  • SHA512

    ff164afafdf59ab4b18984d4ffc320f96153ef1e685a366fd7155da9412cebdd73100f49431a5befb0a7e0669e3806d2053c211e7a037606fb136164cfaf9f8c

  • SSDEEP

    3072:jEGh0orl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGRlEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-11_7c3182f58ef9188a8a807e45b2505b94_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-11_7c3182f58ef9188a8a807e45b2505b94_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\{C4C1487F-75FC-43b3-8515-AB9F9CF94EE2}.exe
      C:\Windows\{C4C1487F-75FC-43b3-8515-AB9F9CF94EE2}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\{DDE6DFF9-3E88-4fe6-9533-EE991E3CCE2D}.exe
        C:\Windows\{DDE6DFF9-3E88-4fe6-9533-EE991E3CCE2D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Windows\{F1E08BFD-5B12-47af-8DB9-25B25DF3FAF8}.exe
          C:\Windows\{F1E08BFD-5B12-47af-8DB9-25B25DF3FAF8}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Windows\{09CC73D8-0B08-4e29-8712-16863BABEC70}.exe
            C:\Windows\{09CC73D8-0B08-4e29-8712-16863BABEC70}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\{E62C1E3C-FD9B-4c83-983F-C2740F97CB7C}.exe
              C:\Windows\{E62C1E3C-FD9B-4c83-983F-C2740F97CB7C}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2804
              • C:\Windows\{4290607C-9BCD-442c-8479-682FE8D95A53}.exe
                C:\Windows\{4290607C-9BCD-442c-8479-682FE8D95A53}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1644
                • C:\Windows\{659124B9-63BE-4173-9492-A272CF5E98D6}.exe
                  C:\Windows\{659124B9-63BE-4173-9492-A272CF5E98D6}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2180
                  • C:\Windows\{95D408A4-3A18-4c08-AAB9-7AD53FD69CA1}.exe
                    C:\Windows\{95D408A4-3A18-4c08-AAB9-7AD53FD69CA1}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:868
                    • C:\Windows\{DD9D2B7E-53D8-416d-A865-F9594F00A812}.exe
                      C:\Windows\{DD9D2B7E-53D8-416d-A865-F9594F00A812}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2968
                      • C:\Windows\{D4946CAE-73E7-437e-B59D-E90422A7EDB6}.exe
                        C:\Windows\{D4946CAE-73E7-437e-B59D-E90422A7EDB6}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:572
                        • C:\Windows\{464B8540-EAB3-40dd-974B-993681074397}.exe
                          C:\Windows\{464B8540-EAB3-40dd-974B-993681074397}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2900
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D4946~1.EXE > nul
                          12⤵
                            PID:528
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DD9D2~1.EXE > nul
                          11⤵
                            PID:2888
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{95D40~1.EXE > nul
                          10⤵
                            PID:2036
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{65912~1.EXE > nul
                          9⤵
                            PID:632
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{42906~1.EXE > nul
                          8⤵
                            PID:664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E62C1~1.EXE > nul
                          7⤵
                            PID:1868
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{09CC7~1.EXE > nul
                          6⤵
                            PID:1812
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F1E08~1.EXE > nul
                          5⤵
                            PID:2748
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DDE6D~1.EXE > nul
                          4⤵
                            PID:2488
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C4C14~1.EXE > nul
                          3⤵
                            PID:2548
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2628

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{09CC73D8-0B08-4e29-8712-16863BABEC70}.exe

                              Filesize

                              216KB

                              MD5

                              95cea778d91883fce4c7a205a0cbb3f8

                              SHA1

                              64c214712cb114afec5ea42e9b4e7d473e5922d8

                              SHA256

                              65d03a6bc0a8d347fb294f5d25c2b9af80d2dde83757549967f2fa51b309637c

                              SHA512

                              6febd6eb99b776068002f1fc24dc495202369f531bae87d98e84976413f739d31ed87ac6c09a756350187c759b30641b990bb7fb5957397ea2d1c3b14bea52df

                            • C:\Windows\{4290607C-9BCD-442c-8479-682FE8D95A53}.exe

                              Filesize

                              216KB

                              MD5

                              db8f42dae220fb1ef524481dd5692c43

                              SHA1

                              9dc733b88936250904cc259de02e363401779245

                              SHA256

                              9a4674157f80462124c907eeeeb9203782d24335355962577c337996cbcf90bf

                              SHA512

                              7ae67f42f2ccd900da20245085ab689da0bfacb80968e8deb65c8edac2feb1f15cdee383ed5f70ad1d722463b04e3bb09fa0faa97a5e1c7c181f4442fd390109

                            • C:\Windows\{464B8540-EAB3-40dd-974B-993681074397}.exe

                              Filesize

                              216KB

                              MD5

                              65ca3163f02c80646d6d878d0732771c

                              SHA1

                              7ba8295726268d43f77d2d9c451ae71c57befa4c

                              SHA256

                              cd0d6b77dcbcbf67ae0f4d2c1038c4257a969d06a0eca8fbb59e8304db07ec67

                              SHA512

                              7029015ed7ebaf26c8ec8621c292ddc3ce6d737c35966fc6da5e672299261382e982e21b7e3ea72b3d92ffe5810851e6c533ad14281816891cb43bf1954e5568

                            • C:\Windows\{659124B9-63BE-4173-9492-A272CF5E98D6}.exe

                              Filesize

                              216KB

                              MD5

                              2e74163792232ea25d608daf74bf673e

                              SHA1

                              d07db5f3538d6e4e15737c6062285350dd839b0e

                              SHA256

                              96b636f8b248552757a1db61bdfaf62712c0fc3651201e288b1c51b3efe3625c

                              SHA512

                              aa9e2777ef69a2f0f9c62438ed3211305ca172efa44700cf24b71548dc2e139e5fb941f3606d41346c492607fb63d552cf74e6e4a75923b2b4033ad9e4dbb4d1

                            • C:\Windows\{95D408A4-3A18-4c08-AAB9-7AD53FD69CA1}.exe

                              Filesize

                              216KB

                              MD5

                              fea4f03366f05871638e30ecf5e83b66

                              SHA1

                              7fecfd503741bcbf47bf46555b3511d0a5b74f58

                              SHA256

                              f986b9b649596899528e5a23102eba85220c477de8f5029dbc2aa723ccc0b2a8

                              SHA512

                              e777840377d9e025dee8ade6d5f2927f0b57844b230febd4373535fa49e89008aef56aa8006b712e32ffb4c75b65d126d80b48df4ef333e88cde235c84466bd2

                            • C:\Windows\{C4C1487F-75FC-43b3-8515-AB9F9CF94EE2}.exe

                              Filesize

                              216KB

                              MD5

                              c4a19db7c369ceac856bdc9b9c18ae40

                              SHA1

                              aff4119733b1e6632a86df994430e810d8dbc549

                              SHA256

                              1918afb3e74f9daba42e15136faa16db3c755a0c3c1b76e245172686bf7c6c9b

                              SHA512

                              df000e70abcefe46ab200456b2e4cecb1445e25f6e17053f43c90a8376d548e6c18c1b5100a40119287f25c99e786d3704d7ca8e2022c14df73d6d74415b1bc0

                            • C:\Windows\{D4946CAE-73E7-437e-B59D-E90422A7EDB6}.exe

                              Filesize

                              216KB

                              MD5

                              addb05aff284ac1fa250e73f5fc7adea

                              SHA1

                              c707a0d17de04ecbe09224159cfdeea4202382bc

                              SHA256

                              34b88cbc944cc68b2c89add0888f39dd6167fe224910b70425e2a24d85367c9d

                              SHA512

                              612f557870c77c3428cda5dbcefaddcada0d425c58a1a9a0cb1315d181e3a5c12547c18674f7c4ebf69ebf7d5cc0565aaab44c7f9cd3f748de5705d10b927f5f

                            • C:\Windows\{DD9D2B7E-53D8-416d-A865-F9594F00A812}.exe

                              Filesize

                              216KB

                              MD5

                              4180a2a80e53fe26ac1a7ed56f48754d

                              SHA1

                              aa002f04b7c25ac84cdbbe4fb9b4bb7be5d85ab7

                              SHA256

                              eabdce22f3609714662c3ba82f6c5945f2dd1b2d7733fe8532d30e678a7aeb9e

                              SHA512

                              6067a03447a2b66051b311deff0ec122ca78745a6d7373b811cfedb42c20c70b1202cf3f16629546ee72d6368dc66bc74ae01631dd9b79e8db0ee9f5cdc6a5bc

                            • C:\Windows\{DDE6DFF9-3E88-4fe6-9533-EE991E3CCE2D}.exe

                              Filesize

                              216KB

                              MD5

                              b07e6abcac430335fb8fa3f549c2779c

                              SHA1

                              23fe8b9aaf218ba2c665f25f86b4b1b79408621c

                              SHA256

                              25d0b88b0b80f182bf079c15b4cad6f0c33b3e822a18791da1edd244b1e70072

                              SHA512

                              262d01f9006e538a578c72ff0f2c48c720b958156e549bcd7ce61fa4663081e5305170444579b9b1e080d0de73457c76c07c7a182ab13f42acb599cdd3186e0f

                            • C:\Windows\{E62C1E3C-FD9B-4c83-983F-C2740F97CB7C}.exe

                              Filesize

                              216KB

                              MD5

                              1ea64a5af4cc0982f9502fdda6d83f01

                              SHA1

                              7371dcf26cb1c56bb0d8aa45e962ad872c3730bb

                              SHA256

                              8bb16d7d6166e3d445d9c075a4f7aea3969e43b0d86fa5a4d51300ae6896ef0e

                              SHA512

                              b5b9dd53775eddf9f9608ee1e8fe713043c147bf7115f5e86384c407340269196d8974f0fa71cfddd89471a0726bd2795e62f90f2659125a42074f5eb7d8c984

                            • C:\Windows\{F1E08BFD-5B12-47af-8DB9-25B25DF3FAF8}.exe

                              Filesize

                              216KB

                              MD5

                              27fd985296f6173f1540bde5ae37078e

                              SHA1

                              d3e099a559c407462b6b6f3bf66b1fa7a3b92fd6

                              SHA256

                              fdf8b68cef1c7893487adec8e4c15fb7ad22e5b3636232b31b1db796cf423bdd

                              SHA512

                              6f61eecf63aff94b6d69f4b64206bf1f1156a8f9c21a36b35f531f02ed113bcc790c6ef30222cb1999e179508973b4c48325ec32d0ef27d65d781db6d27d5bba