Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 03:33

General

  • Target

    2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe

  • Size

    408KB

  • MD5

    4504243033ed8205cdc7a434a43d1f0a

  • SHA1

    62423e7e1f5bb165116f603de7088cd9b34e6e08

  • SHA256

    04a434581522721af09075ed5f1ca72b272fad2008a84f70d904a4c0d4a53c98

  • SHA512

    476e3cfdbe9c65cd388817f5dc4190299f8c9d7a3416d2da3329addb0535052c0981997674825067f448675b96d37aee31cd2e97ba9d3527fa5670527849b291

  • SSDEEP

    3072:CEGh0o/l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGJldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_4504243033ed8205cdc7a434a43d1f0a_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe
      C:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe
        C:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe
          C:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe
            C:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1008
            • C:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe
              C:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2720
              • C:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe
                C:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1768
                • C:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe
                  C:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2300
                  • C:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe
                    C:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1456
                    • C:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe
                      C:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2212
                      • C:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe
                        C:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1236
                        • C:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe
                          C:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:908
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E52CD~1.EXE > nul
                          12⤵
                            PID:2312
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AA84B~1.EXE > nul
                          11⤵
                            PID:700
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{236E9~1.EXE > nul
                          10⤵
                            PID:2024
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{50EDC~1.EXE > nul
                          9⤵
                            PID:1136
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2B682~1.EXE > nul
                          8⤵
                            PID:2516
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EFF7D~1.EXE > nul
                          7⤵
                            PID:2396
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EAFB0~1.EXE > nul
                          6⤵
                            PID:2752
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9446E~1.EXE > nul
                          5⤵
                            PID:2636
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6F7BD~1.EXE > nul
                          4⤵
                            PID:2492
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{39662~1.EXE > nul
                          3⤵
                            PID:2600
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2436

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{236E9CA2-679D-41e0-A925-6F2D9084B393}.exe

                              Filesize

                              408KB

                              MD5

                              b238609efdd1ec74f1d4ffe775ae3245

                              SHA1

                              8a439ae273dfd1fdddc530350890d8a85f556cc2

                              SHA256

                              4396740726f51e508cd118f90e9afe3d782400ae8e8e55fc8d9e6da3857b050b

                              SHA512

                              81432d2d2da77b8d587a148da9dbc8ec7c5ea8dfce117ca1eaa968d35d1b99190cdf7d5d43729d9f562bbaed77a3eef7c1bceaff12cfa0c99b5d71e4862218d6

                            • C:\Windows\{2B6829C0-5DC4-4449-9A35-E6AE6C0EC272}.exe

                              Filesize

                              408KB

                              MD5

                              8ff9b9b93666ce8fca222b6b2b63a25b

                              SHA1

                              889c68a3c111db0c3f4474e14f5e2e1eca7a6601

                              SHA256

                              22104870df65eb1f2236b711b64e41b87508694e828374b665e812ec42710dfe

                              SHA512

                              81d546345bcccb2bd353399aacb594284901ae27f8df2f3c256fb6140576659927cb69377e4a95325eddac7ffcdd3d113ba457b04763a518ae2f3554d3784686

                            • C:\Windows\{396628D3-9044-4a94-9DD2-49C0981826E1}.exe

                              Filesize

                              408KB

                              MD5

                              2811793d2f9da1d24583afc4c9aca0c2

                              SHA1

                              b46988ce2ebaad11cbe39ffb34247686debf47d1

                              SHA256

                              3f85b28df4fce71faa6ce761e1cdbead4909eda52fd649de5369b8e126fa5ebc

                              SHA512

                              4c27b80aad59db61079a4d097dbd25c1831f046d81b44deb1ee455ea5cea12d61fae818e97972742d6e33a16a19e08d4ce200811730e1bba5fef64c697d9ada1

                            • C:\Windows\{46A537A2-4777-4263-A4FD-2B774371F8DB}.exe

                              Filesize

                              408KB

                              MD5

                              14f91aabd70e2df51532538104473dbd

                              SHA1

                              4e9577d7fe1654e361d886fffd87dfc646d2e938

                              SHA256

                              fcbe054109b7fbfc5e427122799a7870ba1d92828508d2dcf0f010df5752cb47

                              SHA512

                              854c5004a163be4c0bb134c9121da72299f86dd2ab94fa9f5355243350d9a2e80c36a69b3e110588e8cbc80aecb78867bff7eb353d164945a7415676215a3c1e

                            • C:\Windows\{50EDCE2A-3361-4a0f-9FE3-C852EE169819}.exe

                              Filesize

                              408KB

                              MD5

                              9ff73f421ff7ff3022b650e8fa568867

                              SHA1

                              39ff6a74f283b69b81a6d4f1e19ef2d3fee07c88

                              SHA256

                              9a2b8ed97338568aa9a76c249677f8ed4d5059db71aed56bc3fd0ce2874c93ac

                              SHA512

                              d56b10d5a38ee4b09215dc8ada987400a72cc45951b1ec5760d0110d18059a9d5830a79b4db805d322ca881536b921b3384dd408dffa77d44e3540db669555ef

                            • C:\Windows\{6F7BDEC3-DBD9-4956-B8B9-458D58D38B91}.exe

                              Filesize

                              408KB

                              MD5

                              59d701915f45b962ab22f220e0254244

                              SHA1

                              bd77868ab32f2f6a19b448c4c1716b06cfaec241

                              SHA256

                              0ed718d8e886b2a78a194bf1ab2bdfb562b18a32d74f424d10b78963ad694ff5

                              SHA512

                              bf7d9de33d4e54ee6a71a9d963b8e6c80af270e5e2c54f8fb049d4671bbb534b5344a0adab549f33248251dee7242c2f96a5473c30f87996a12c2864a6ce1215

                            • C:\Windows\{9446EAED-3214-4f3f-8FEF-8F2E6216D63E}.exe

                              Filesize

                              408KB

                              MD5

                              14d2d08b2c700883c04b7b6d8880160e

                              SHA1

                              4bff8430c3379f23b222c39d97162fd1aa7d9c96

                              SHA256

                              f85894b692636af684f92ebd4d0e3df1889b82572ddae8604bf5d8f52b837935

                              SHA512

                              53ef8ff518add6256a9147831f9ba7d639da8c29950bf72236c30bb95f1d7acc9042137de54a17c32b550b4c30ec96c6f4aa1e1560c9f127fad53d6eea979e8b

                            • C:\Windows\{AA84B886-3B8C-460c-A94B-01CDD5D04B20}.exe

                              Filesize

                              408KB

                              MD5

                              bc8b60d3043563b1b63f749dade9c2c5

                              SHA1

                              4407ba2bdfacdce3936234cbb9ddbcbede7b0aa1

                              SHA256

                              d8a24a30157bd32b24a2212ee1286fc6b45cd59b3f0f3d0e6877574545df40df

                              SHA512

                              514510714886f6f94686351fe1b20ada83d6c13afe0d52b78581d97597aeb062ec20f19c67c0b6066ce0ba9e9bf740cbb018f88d7c921d7763cd419b2daf64c6

                            • C:\Windows\{E52CDC07-0412-4f91-A36D-E0B6157B77B0}.exe

                              Filesize

                              408KB

                              MD5

                              6c5f5eb3cbe13098c56097a20f60d4da

                              SHA1

                              f67ac9af11fbb26637bb8e003206f526f9ba4e6c

                              SHA256

                              c22927f89b774b2e1749306af4389792e786a7849a4a9f3acafac177304524d1

                              SHA512

                              f1924c5b4b02d5a069e6c597962d9036b5e11ddfb1ed5ae7a420a64aa3eec35b7cd0471464184b6c0433d10ee3121ef917e1c8d2b8ac7c56a5c558d82003c443

                            • C:\Windows\{EAFB0AB1-0774-4bf9-A5D8-5C7A5C223344}.exe

                              Filesize

                              408KB

                              MD5

                              87e7674a7429ba71f59a578759aa8806

                              SHA1

                              1279d9a48b16e1977fedf6a0d00a9167c0641fd1

                              SHA256

                              2236265dd216943d9d038954a206830e29364d68f6f36ad492b607071e4fe688

                              SHA512

                              87f45f9ba51a8b5000d80ada66548fc06926650727b53a489579a7209a29f8ab5acff7b6a911f848157ba4661eed6397c5d412cf4b22d7f3496ffb925dc54465

                            • C:\Windows\{EFF7DFA4-FC31-412b-A88D-AC53E6D01A9D}.exe

                              Filesize

                              408KB

                              MD5

                              a1981d54b77710e610192e1434bd1a96

                              SHA1

                              d04b7f9384a4e5c4ef1f9d7e102cf94ab59f7871

                              SHA256

                              7d4b82febe245595199ae0b84d96c0a859455bbdf679d9f40ddb0669432f7874

                              SHA512

                              d7d395e394e7a79efd9b80b7a36c85c197547e416813b73bb780f895dd6dcb119f5aa144bee94f857278c32b0fa78a5570f07f966dddcd0fc7a34213568d80ac