Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 17:23

General

  • Target

    2024-03-12_024687052e95bc586d75402c16e68316_goldeneye.exe

  • Size

    168KB

  • MD5

    024687052e95bc586d75402c16e68316

  • SHA1

    09227454101ffe822896aeb37cb6f9d432fac5d4

  • SHA256

    c97c7bf7a9035b1e7791c4778c19801918a15d6b7bee9e24866478a4258d4297

  • SHA512

    3b1c3173bb44a3b89b7acf1f37803109c0ea77e8b0d03033f42cba247a68907e50d51f6c757611d5e9d93641dae6dae83a80edb41e9c617ba975c3f08ada41f5

  • SSDEEP

    1536:1EGh0oOIli5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oTliOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_024687052e95bc586d75402c16e68316_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_024687052e95bc586d75402c16e68316_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\{6BBA6215-B969-4248-83B5-F24BEC8033CC}.exe
      C:\Windows\{6BBA6215-B969-4248-83B5-F24BEC8033CC}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Windows\{8889D0BB-B802-4b2a-93B3-B30E67EB8690}.exe
        C:\Windows\{8889D0BB-B802-4b2a-93B3-B30E67EB8690}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\{A16244F3-8924-4414-B272-04A52481B9C2}.exe
          C:\Windows\{A16244F3-8924-4414-B272-04A52481B9C2}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Windows\{6540DEF6-B990-4ddf-84B2-C589F3ED1E60}.exe
            C:\Windows\{6540DEF6-B990-4ddf-84B2-C589F3ED1E60}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Windows\{63019F40-EA67-45b1-8AC7-FB2B3555E620}.exe
              C:\Windows\{63019F40-EA67-45b1-8AC7-FB2B3555E620}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2908
              • C:\Windows\{B314DF08-525B-48c2-A590-9A6F8ACFD03D}.exe
                C:\Windows\{B314DF08-525B-48c2-A590-9A6F8ACFD03D}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2316
                • C:\Windows\{214302E1-61E8-4046-88E2-E271FA9BD26D}.exe
                  C:\Windows\{214302E1-61E8-4046-88E2-E271FA9BD26D}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2136
                  • C:\Windows\{065266C6-54CC-47e5-BEAC-AB79A808236C}.exe
                    C:\Windows\{065266C6-54CC-47e5-BEAC-AB79A808236C}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:640
                    • C:\Windows\{C94845C6-ACFB-48e6-A023-8C106C5453A1}.exe
                      C:\Windows\{C94845C6-ACFB-48e6-A023-8C106C5453A1}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1328
                      • C:\Windows\{3CEC4B0C-51BE-47e3-960F-D72FF94AED66}.exe
                        C:\Windows\{3CEC4B0C-51BE-47e3-960F-D72FF94AED66}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2240
                        • C:\Windows\{DFE25ECF-2D39-47fa-A129-DDEB3C5966EE}.exe
                          C:\Windows\{DFE25ECF-2D39-47fa-A129-DDEB3C5966EE}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2992
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3CEC4~1.EXE > nul
                          12⤵
                            PID:1936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C9484~1.EXE > nul
                          11⤵
                            PID:2592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{06526~1.EXE > nul
                          10⤵
                            PID:1228
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{21430~1.EXE > nul
                          9⤵
                            PID:1112
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B314D~1.EXE > nul
                          8⤵
                            PID:796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{63019~1.EXE > nul
                          7⤵
                            PID:1996
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6540D~1.EXE > nul
                          6⤵
                            PID:2888
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A1624~1.EXE > nul
                          5⤵
                            PID:2148
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8889D~1.EXE > nul
                          4⤵
                            PID:2480
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6BBA6~1.EXE > nul
                          3⤵
                            PID:2536
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:3000

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{065266C6-54CC-47e5-BEAC-AB79A808236C}.exe

                        Filesize

                        168KB

                        MD5

                        762d1ae1a2ca77d971bab595ec4de30a

                        SHA1

                        ce981fbc2674cdc632b99c22041a3064c7dba3c7

                        SHA256

                        11eaf0d08be5bb59d9f02cf35da7e030e446123860040753fc6f6da6af4ca47d

                        SHA512

                        90e924b695e4221a51d6f7499620e4e2bc52dcfa31e0aa3862187a038a554ca72ec26a2db9caef51347170c13680eb422e89732d652304edd4bb38ebb4f631bd

                      • C:\Windows\{214302E1-61E8-4046-88E2-E271FA9BD26D}.exe

                        Filesize

                        168KB

                        MD5

                        4a4902f619190b5c5e635a58b2c2fff7

                        SHA1

                        b28ad28d974995590d49d59e161817e9412c325b

                        SHA256

                        7663e6c9bbc4ff1f356d6e3ff58ecfb6afaa840896f523056be66859232bd180

                        SHA512

                        38d4eb6e07bc96bc37fd8b47286c5a24cf12598dd82fab3a5b7e0d69f75217119a15666cf048de6888d5366bf5949e7d6d389fc903bc0505813d26a9b84a0bde

                      • C:\Windows\{3CEC4B0C-51BE-47e3-960F-D72FF94AED66}.exe

                        Filesize

                        168KB

                        MD5

                        ba4d721af3b73c103ec483b0b20fc008

                        SHA1

                        ef26c772b091e633ae4444fbbb87be7d1e80b9a0

                        SHA256

                        644321e2da6bffeb78dd854a6c568300b879856540f2b1dd16a75ad5a5c55861

                        SHA512

                        9996324c86757eeab833fe20ffde3bd84a880dbde33e317fcbc2d7a28715c9c2b2d8f8b44fec6577858640348fa1e62035679cfab2c45e6f0082efb35af8fade

                      • C:\Windows\{63019F40-EA67-45b1-8AC7-FB2B3555E620}.exe

                        Filesize

                        168KB

                        MD5

                        20861abf0e8730557f799a255efbecfd

                        SHA1

                        dbf001277f0b213ee004f648f263620cd68349cf

                        SHA256

                        9446dca0c25213439b5fc627052675b3c99acc1524409b0b81e11b16e0b35d9c

                        SHA512

                        564f158a931b4c5840ce0375f0633b71a68dfd7f52e8c27863ca750ed2a271e6d97795e9a2aee27fa28cda2f0941109cfb7bbda344088edbbce495419ecb3735

                      • C:\Windows\{6540DEF6-B990-4ddf-84B2-C589F3ED1E60}.exe

                        Filesize

                        168KB

                        MD5

                        ad15cf42c0d393d30b1e10563edd789d

                        SHA1

                        ab0e4165d420bf5d0edc78690696766a7ae01c00

                        SHA256

                        76bbe17e2a7e04beffe651d4dcde1df8e9918ef4bb7af7c600ecc3647148d2fb

                        SHA512

                        203026541f6cafc994c8d3d22fa038f73c4f6a8a587f8a598511321ad419eb70fbfc5ad63736df53bfe70cf4e08640c5bfe9e69c15943f6d42f094d12f7f251b

                      • C:\Windows\{6BBA6215-B969-4248-83B5-F24BEC8033CC}.exe

                        Filesize

                        168KB

                        MD5

                        bd32ff4596062bd014a4a51d80a473f4

                        SHA1

                        d3b2bb04a36ad2b0bde7cb173bd2983265dcd99f

                        SHA256

                        af2807731eac9d7a5b46845dd4a51dcf75562d40e268c52a8205b4ecb27af137

                        SHA512

                        1a01c4807bba9a0c9ba780dda879f5139dd56315307b56f25a6a4eadb78fb8a2daa7fab85a6ef751dd59f8da08e02e4e93e1daa0f93dfee062f66be84ce089ac

                      • C:\Windows\{8889D0BB-B802-4b2a-93B3-B30E67EB8690}.exe

                        Filesize

                        168KB

                        MD5

                        6d5772f791dcae6aa15f30e5b7d8d474

                        SHA1

                        78bc6137c208e806baeb0b668624192468bafd64

                        SHA256

                        7e4bf207947e96be39c1879a8d0b816c3bd8b355d079e6bcfaf932afa3f6376d

                        SHA512

                        b215611ed4d867dcc2b99885813fa8fece01760609b7a88843428f4eee847c00c75d6a7e5d579d18091cab722ad7c2c74fc11f690ed8ce4ad90452e5817a23af

                      • C:\Windows\{A16244F3-8924-4414-B272-04A52481B9C2}.exe

                        Filesize

                        168KB

                        MD5

                        00e781a2e0ace4e43d3ca98b2d09a045

                        SHA1

                        335c8f7962725a3ee3df3a01d3702ddaf4079cba

                        SHA256

                        d999083dc15f3ec03884bb174bf4fafae33ad1105d2cbf6d7d70d89afadf022b

                        SHA512

                        de1124814f7850ce9cd4b2e826b23e7d7772142ea959b76bb6288b3282d38b27c57354e98fe10f8c47dba57d57b856eb2c3073ffa78ea5ffc31306ce6f1b2e39

                      • C:\Windows\{B314DF08-525B-48c2-A590-9A6F8ACFD03D}.exe

                        Filesize

                        168KB

                        MD5

                        8c1ab7a9148e7d2fd49290536e375451

                        SHA1

                        956696e2055e50cab3774af0329e9293754eba08

                        SHA256

                        21d7c5c7a605493dea0446f50c59dc8447470634fcf1e62ac5d0d5cb202f4c79

                        SHA512

                        61906c41eb13eb9f80b0fee89cb98d58f13d8a74befdcc1bf99baf3ecb5d8c71458faa2ab639fee7d39501573e452c98e115449b56103c10ac961ba72bef27a4

                      • C:\Windows\{C94845C6-ACFB-48e6-A023-8C106C5453A1}.exe

                        Filesize

                        168KB

                        MD5

                        6453d6003a3b872b3c682473a0ebc16d

                        SHA1

                        12e5be814e5f0ce9644a93d2bdfd238e7c81737c

                        SHA256

                        a4bfd0b3c508beb03731bc0f4257418f8f08661e823b0ebe5648fdea50a55606

                        SHA512

                        ef47197b8e734940b343a9f5cb81f928dc0b0f5a10bf0ae4231a1f0ab9cee56fc7b477ed78ba2feb9b6de3e91a139bf773c2ee7142ec885ba5fe7af3ae6e268f

                      • C:\Windows\{DFE25ECF-2D39-47fa-A129-DDEB3C5966EE}.exe

                        Filesize

                        168KB

                        MD5

                        f66923a9096e334c47c75ffa1f2bbdfd

                        SHA1

                        73529da5b29752353e6dc1f49ccfcf937bb3c14b

                        SHA256

                        8c0993611fb51852f4f891aa0c1b8de734308cc66c6b2552356a04044a4f1968

                        SHA512

                        e698f0958d9387e95634e3296b7899c4b06cdee02f69a87fde5b10eeb1a1b5b4776aae4ecadc364dd0b6ae83655ac02e449467bb6eb8fda1cc708b797b98c579