Analysis

  • max time kernel
    160s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 22:31

General

  • Target

    2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe

  • Size

    197KB

  • MD5

    93828db7f381bf70066d151df16c1dd0

  • SHA1

    6b5c44e14822070775d2330dfdfad57afd247dde

  • SHA256

    c171fc614da684e185f775c5dae17ff3ea1becedf2667df94f2b58b106ef0029

  • SHA512

    ff7ffdb27bebb6901e338019909afd5660b0de2847642101c70ce7b1e7eaf30b0c3e8c627b935f8c52ffc6a8137dd20a9e1f205b79d7aa20632aca4d6e7a358a

  • SSDEEP

    3072:jEGh0okl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGOlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_93828db7f381bf70066d151df16c1dd0_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe
      C:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe
        C:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe
          C:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe
            C:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:952
            • C:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe
              C:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe
                C:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:440
                • C:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe
                  C:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4780
                  • C:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exe
                    C:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2228
                    • C:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe
                      C:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4784
                      • C:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe
                        C:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1640
                        • C:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe
                          C:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:3236
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9E09E~1.EXE > nul
                          12⤵
                            PID:1968
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6607C~1.EXE > nul
                          11⤵
                            PID:4076
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AFD25~1.EXE > nul
                          10⤵
                            PID:4508
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CF026~1.EXE > nul
                          9⤵
                            PID:4008
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1EB6E~1.EXE > nul
                          8⤵
                            PID:4376
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{299A8~1.EXE > nul
                          7⤵
                            PID:1312
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{34999~1.EXE > nul
                          6⤵
                            PID:4600
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F28B4~1.EXE > nul
                          5⤵
                            PID:5112
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D3EA1~1.EXE > nul
                          4⤵
                            PID:4088
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CFB75~1.EXE > nul
                          3⤵
                            PID:380
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:4076

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{1EB6EE8A-CE50-41ee-A637-837BA0851E0D}.exe

                          Filesize

                          197KB

                          MD5

                          71ece801a3b732c093716dcc9162166b

                          SHA1

                          29a7e6fb7c1c0b13b80888ee911678f5a3c53d2f

                          SHA256

                          1cb920e8dd46ed3d9f3b24a22272cca44afb4aba8d1b4915aa5cd81eb692ae47

                          SHA512

                          d1c038c63821af6d15aed98dc69f4e6857bd52f68fb4801cc674b7ebf60cca8a81b839854e5462fcd24fa8d6f39fb876359c42bcadef31526e9ea7b3d08c15d8

                        • C:\Windows\{299A87AB-8710-4ab8-A41D-CB53D555328F}.exe

                          Filesize

                          197KB

                          MD5

                          0226f666f7cc41613dff24f4ae0720c6

                          SHA1

                          dffb5cf4e9654119446eb148c7f6dbde6930b9bd

                          SHA256

                          ee8d4dd45c326ab0d28313c72d48419fee380b972641416ac5b57444d2bae1a1

                          SHA512

                          829c2360bf4d2525ea1edf5a3475f21884cb6a0e31647b5aad102adcd2d03e59db5706570df41af632f46264f16764dce8b43019bf627688a63cbd930b15796b

                        • C:\Windows\{34999EB7-72E4-4d72-9470-BAD347CAB229}.exe

                          Filesize

                          197KB

                          MD5

                          4e8a7c64b4c7ff4d3a5957fecef77e99

                          SHA1

                          2b11cea15dc36965b18b42a89085579041d50957

                          SHA256

                          19bbd3abd4d4fed138db86e220565cd51c49b8686011dacda659bff9b0be0490

                          SHA512

                          8a0fc6cc6134a5f43c6bbf7b59660ab0beb82abecdb87cdf56e2f9d7efb045aa150121ff34a64b6ec931df7aae86bad79d59aa7f3bebff52c6a187f3e84de38e

                        • C:\Windows\{6607CD11-3AFD-4963-B648-8911B5B72ADA}.exe

                          Filesize

                          197KB

                          MD5

                          90045364738aa6b1248547a40c3dd83e

                          SHA1

                          a7fedfd67befc6de89122e7fe43e3b2f0e3f6989

                          SHA256

                          d5a24ac3a0cde6d878908f977c4607b25c6f546e60dca9f46309bdccf5f58c4e

                          SHA512

                          ecf8d3bc47f68ba5751773548ca262add4909c81fbb95a77dcedbd2f08500bfe4596886c0127b9a8cf4bd05a5eb3f08fe86aafef76b2692dea400ffa7838ff70

                        • C:\Windows\{9E09E7B9-F210-4fec-B367-E1F951CDC386}.exe

                          Filesize

                          197KB

                          MD5

                          907fda39a3505299c4fe750de7a61149

                          SHA1

                          f967c8e0a67a6660b21191ca367a4c8a2bdafaab

                          SHA256

                          c36aac014037d886c648bfcadb45fcf53d7d73bdde01f9b628090a2c8683fce1

                          SHA512

                          27316e743d7d9a297951428ff23fd6247d9c63d5e584b0981ef3f4b3c46dd865574a305fc79aa356a225cd425c92a2ee5f0edec31327bb37f5871456a3863ba8

                        • C:\Windows\{AA994D9C-9A20-4869-A5F5-D75B5617591B}.exe

                          Filesize

                          197KB

                          MD5

                          1affd3e4f2cc8dafce70b496be102762

                          SHA1

                          816b7d1ac773a6e8fd4313580e9285a3565041d8

                          SHA256

                          831242d03ed3cf4a45519e78812c3f550097deafb743683f1dc7adacd4083dfe

                          SHA512

                          88ba778766c49c20db4497ee6995f99c65c71bcffdd273eb6676dfa5910395300b8bb619e606b0b0b97b9f2c066bbbbbfe4304b9171f004596d9ed7243975b8e

                        • C:\Windows\{AFD25213-8233-446e-B83B-C414F6440C45}.exe

                          Filesize

                          197KB

                          MD5

                          e026387b6fe6e27e902eb4c5e0747047

                          SHA1

                          0620482ef0c492eaa9f0f4b8710d391c7cf43878

                          SHA256

                          166b9d80057f24f3350edf290d637fe5c10207225e239329e02a336607601455

                          SHA512

                          62a623c3f452cf88d5e09f92d91ecd54bb719c6afbc08c233e9680def1073050d11c693bbe5e7b06fa63756614425b5e2f396b12876b6dfc13e193bf573721a4

                        • C:\Windows\{CF026B59-1E1C-4fc3-9944-961C743E892B}.exe

                          Filesize

                          197KB

                          MD5

                          103b412a7693e55e5561f9870d95352e

                          SHA1

                          e454efacf906292f5dbad650c0d49d341c734194

                          SHA256

                          7fa3b92f0f37aa085a7fff00da437abf4d86d71296805b6505e78bdc75988b87

                          SHA512

                          55cc9a56db1f04565372d765dd6079fcef77659b8d3922f1d4b5b5f689e08fbf1621059c5d90ecce55eea25d865a320de6630ea7ccf9af80b0fa05505709f3ae

                        • C:\Windows\{CFB75647-6AF2-433b-BD80-253D3F0AEF0D}.exe

                          Filesize

                          197KB

                          MD5

                          d5a018ddc5773edff16d0fdebbdc3b1d

                          SHA1

                          3e2f09de03228bfeab35a164606330518b5cf24e

                          SHA256

                          e57e02a7d3d4e13e371b5da3bcca9655ddc5b9d5b95004ee95319ba24c26f1f8

                          SHA512

                          fee35062f0c730d18f0f1bbdfc3ca604600db060d7042ce3461cf140a11d2dbc48cfd7094b47f216b0ff94b6979d7ac8984f6092cdd96002a64b198644540788

                        • C:\Windows\{D3EA169E-B0F5-4767-851F-634B53461F37}.exe

                          Filesize

                          197KB

                          MD5

                          3d1b458e034d4ccd27d2960be8f8755c

                          SHA1

                          225b2dcddfb8ae5477f991eaafe991a29d716bb5

                          SHA256

                          5d4bc81bf39e68717b01b7f6c2291d6d72886998006fd0973da1974fcca5d405

                          SHA512

                          68deba62a91d0801e54edeca5a2c16665021db174ebc1560a384a82911dee4179cc5b4451c7c96d93fedeef064414733ed363febc4f48a2ed89f88c2a1cfc816

                        • C:\Windows\{F28B47F2-2296-4a08-8E9E-757AA534F7D3}.exe

                          Filesize

                          197KB

                          MD5

                          7261bc7063d0fd742c72029ccd199612

                          SHA1

                          5a838996747e0343ed061d098ddbe72fdc8f4938

                          SHA256

                          41fcedcd24e61cc6ff0a999dfdeb21a4399ce5d0c16024293463510d98597d0e

                          SHA512

                          8bebd34ac35e0fe2dcc4b1aadfd89d36a9b970bab2b7742e8cfdc84c551acb6ac33b948ac82d923f459c0e123fc71708b0e7603da63e6be73f9c8d7bab0ef682