Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 08:40

General

  • Target

    2024-03-13_a9ef100867ef5bde12ac04ad058932c9_goldeneye.exe

  • Size

    197KB

  • MD5

    a9ef100867ef5bde12ac04ad058932c9

  • SHA1

    1a9360fb189e483c0077ae8c8da11c62e1c292a0

  • SHA256

    72ae3839516c476e41712f06a554a9f52d5399529aaaf4ae3f2ef60a0d1e5f04

  • SHA512

    cc7be695d0902a386f560268f9e64b936d9c65d70fe374f02615cb6c11134a2bc540dfabddc103879e8990c493b95c7ecd2bcf9a0a26e9f4e639ecdb9d18f525

  • SSDEEP

    3072:jEGh0ofl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGVlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_a9ef100867ef5bde12ac04ad058932c9_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_a9ef100867ef5bde12ac04ad058932c9_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\{0E43DB19-189A-4fef-85AE-8FCF4C41758C}.exe
      C:\Windows\{0E43DB19-189A-4fef-85AE-8FCF4C41758C}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\{8A58C973-9C12-4b70-B0D0-53EA1FAE4C86}.exe
        C:\Windows\{8A58C973-9C12-4b70-B0D0-53EA1FAE4C86}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\{4CEEA932-7641-481a-88DA-EEA497C85218}.exe
          C:\Windows\{4CEEA932-7641-481a-88DA-EEA497C85218}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\{FA89D2DA-2158-4fd3-BA86-49C896048EC3}.exe
            C:\Windows\{FA89D2DA-2158-4fd3-BA86-49C896048EC3}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2304
            • C:\Windows\{66889307-172C-45ce-8066-F1B309ECB60E}.exe
              C:\Windows\{66889307-172C-45ce-8066-F1B309ECB60E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2724
              • C:\Windows\{EB0A931C-AF3F-4aaa-A4F1-7A6CF3366D71}.exe
                C:\Windows\{EB0A931C-AF3F-4aaa-A4F1-7A6CF3366D71}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:840
                • C:\Windows\{57516514-EFF9-4929-BFC1-489A7D675214}.exe
                  C:\Windows\{57516514-EFF9-4929-BFC1-489A7D675214}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1256
                  • C:\Windows\{6F0F218C-4058-4471-B79A-F7BA8832235E}.exe
                    C:\Windows\{6F0F218C-4058-4471-B79A-F7BA8832235E}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1656
                    • C:\Windows\{95F6B294-DB09-4f21-9229-242F37E2189B}.exe
                      C:\Windows\{95F6B294-DB09-4f21-9229-242F37E2189B}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2260
                      • C:\Windows\{0939CABF-5F3A-40f9-8008-B4820AFEA7BC}.exe
                        C:\Windows\{0939CABF-5F3A-40f9-8008-B4820AFEA7BC}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:380
                        • C:\Windows\{1CCD5F48-5532-423a-912A-FD6FFBE758ED}.exe
                          C:\Windows\{1CCD5F48-5532-423a-912A-FD6FFBE758ED}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:948
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0939C~1.EXE > nul
                          12⤵
                            PID:2820
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{95F6B~1.EXE > nul
                          11⤵
                            PID:684
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6F0F2~1.EXE > nul
                          10⤵
                            PID:2080
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{57516~1.EXE > nul
                          9⤵
                            PID:1760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EB0A9~1.EXE > nul
                          8⤵
                            PID:1408
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{66889~1.EXE > nul
                          7⤵
                            PID:2216
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FA89D~1.EXE > nul
                          6⤵
                            PID:2760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4CEEA~1.EXE > nul
                          5⤵
                            PID:1776
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8A58C~1.EXE > nul
                          4⤵
                            PID:2432
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0E43D~1.EXE > nul
                          3⤵
                            PID:2392
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2520

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0939CABF-5F3A-40f9-8008-B4820AFEA7BC}.exe

                        Filesize

                        197KB

                        MD5

                        98b68855499de6260bffb87dbd6c0246

                        SHA1

                        edafff1eb34b3c3dd4b318897c2bb931fe47c5d0

                        SHA256

                        16616d0262fa5c6968ba7e2e7513e94ac182fccc1af6fd50d43233c37991df6f

                        SHA512

                        12008231f5cab93962555d3ebe310271d03b0327a23a3606f60ac889e5f9872bb55804d97a99dd5d8d90a02fff1446bddb6d919065f77bfe745927f97a4451e8

                      • C:\Windows\{0E43DB19-189A-4fef-85AE-8FCF4C41758C}.exe

                        Filesize

                        197KB

                        MD5

                        fe61d214fc8d463113e1486c99bed4d5

                        SHA1

                        82ca4c2256d4391ea388b137ca860ecbf31cc76e

                        SHA256

                        fff4e3242fc2b215ae8da53e6ae3c740628ebde1f068834eb4c90622e3cde4ef

                        SHA512

                        07f77f2d8262129c5a6ea41f724433f9db6f7fc213404e8015f703e29c76e7ab3bc83b4d684bdd5097b5e41ed91aa3c667d6aeaedc6cb8cdd00b6e9450df00f1

                      • C:\Windows\{1CCD5F48-5532-423a-912A-FD6FFBE758ED}.exe

                        Filesize

                        197KB

                        MD5

                        0cc53d9b25dff2c261896a09329b5286

                        SHA1

                        304a47b1c5c7e5a9916a74cb92765949c666f7e5

                        SHA256

                        482a3ff01feeda9c9cd0a215040768f5868b37d6c7c14a4843e5681f3d044f24

                        SHA512

                        f460db45a66aa0fbcc9dfc1cd1a695939c7068295894b64fcc8f8f15315f011ab4528ea30b012cfebb075ed8e7d830a6901eccadb378af851693b74b4bb0ac0f

                      • C:\Windows\{4CEEA932-7641-481a-88DA-EEA497C85218}.exe

                        Filesize

                        197KB

                        MD5

                        6a441d628d9922e5002b6d63a034e3b6

                        SHA1

                        558e4dd5ab68eecf4459435d37bbcc1ebb3616d7

                        SHA256

                        1daac80b63bcffc20d129a2dcc8cf98e1f5ad19c5747a37f83f229a9f169fec3

                        SHA512

                        e2b36f60910eb47ef2d55193470ba0664bf9dc1cda00a1bc0c9b2c52cc70c1d097a3354d251e9fed922fafd28a8bbe99631adc38717d70585840aa0957007303

                      • C:\Windows\{57516514-EFF9-4929-BFC1-489A7D675214}.exe

                        Filesize

                        197KB

                        MD5

                        0391caa4076eba8de38b1ceef083701d

                        SHA1

                        fb59ad70b750545a964bc0a0541dece65f31cbc6

                        SHA256

                        bc33bb0113c0dba82b43273c4bebb1c62bbf537169ea1721a73947ecf9fca56a

                        SHA512

                        23d8a4af250b3536445952dcfc550b9f767eb98eee85c8d6cffcfe0f80399b3e8852007c0427e692ac45ceadfbe0c666863675eb31a4da4214a6f59014a07ccd

                      • C:\Windows\{66889307-172C-45ce-8066-F1B309ECB60E}.exe

                        Filesize

                        197KB

                        MD5

                        a52c30691adfcaadce57b0b99299e548

                        SHA1

                        4b69dc100a1d2dc3d4f8c2a6bc0c3598b109b06c

                        SHA256

                        0fca7d025e8591e6531d6acbd7534fa639bd07cba5ba5ab516e9ec54dcea6fb5

                        SHA512

                        9fe39e35c0e7be4b9a7e8cee2ff4cd384a3c8bf24c3ce9f0143b74cfd218fe774a9210564256edd83c60680d5d60bb5291cc1bc488ac9737de80929557cb7bc2

                      • C:\Windows\{6F0F218C-4058-4471-B79A-F7BA8832235E}.exe

                        Filesize

                        197KB

                        MD5

                        f35635a30ab324a701cb90109543235e

                        SHA1

                        cf0ef2e3718b467c8280504185c4bad5b3808be0

                        SHA256

                        faea59b77840203564d34313a512b366c5d4981c3156590026afe2168473d9ab

                        SHA512

                        1be5aceff82d85606af1167a22cb07ca7ce9dd29d16c0c6babded151ea0677f96eaf2742357ad460cb1cc5a63e7c9d6ea2fba1126e2e6913e05ff7544bf8a996

                      • C:\Windows\{6F0F218C-4058-4471-B79A-F7BA8832235E}.exe

                        Filesize

                        187KB

                        MD5

                        bc9452d72115138894a0b06d24a29141

                        SHA1

                        72eb27d6da57cb2453201c7802770ed993e38c8e

                        SHA256

                        b33588d313e6a678045d3f83135b3d2ca8414b629939216d1637d30a344b2720

                        SHA512

                        fd4abc30af5e6acc3b0a2f294b4c46916684403cff6f7e6762355d2f7f15d6501f5c046b37398f9de6ff22e5f7338546136c8a58181f050c60a00dbb8498e30f

                      • C:\Windows\{8A58C973-9C12-4b70-B0D0-53EA1FAE4C86}.exe

                        Filesize

                        197KB

                        MD5

                        a661257ca4b6d9eb744264fb66955d0f

                        SHA1

                        2b6ff80e4cc3118ae7801855ffb1701126b3d813

                        SHA256

                        ffe49a3b0eaa7a5d454e31513479b28fdfd051009bedc7e15783509f234066b1

                        SHA512

                        d41f74b306ef1115ed744351893fa99300f7ef71f7a94f4cd33d05bbd0786c5037a25a537f2600065f043d0de858062d098079a6c8e1613a0ec2866708e0ba77

                      • C:\Windows\{95F6B294-DB09-4f21-9229-242F37E2189B}.exe

                        Filesize

                        197KB

                        MD5

                        c9ab19b5c681ed21e93ef388ab01605b

                        SHA1

                        4ca77dc76faebde09c90472f692dbbb227e8c269

                        SHA256

                        72e803ac904b90faff7120de96da00cf70cc5774aabdaf44162e7cfcef1f7a79

                        SHA512

                        833a8a72786720ef9ca55b01779b15a4b70c28a4e9cbc488a74f5929136e87480d6aeaff318707b207f30f9406c804cf138ecdfd37a37002e936c9d3805f401b

                      • C:\Windows\{EB0A931C-AF3F-4aaa-A4F1-7A6CF3366D71}.exe

                        Filesize

                        197KB

                        MD5

                        a62214d0317f829170c50f6216590917

                        SHA1

                        d017b361a59dc4ec471d458a99903385a6c961ab

                        SHA256

                        f76e2f42120a53640351ee1d7e2cd0986763a8b526d6d01b56fa199afb91e0ae

                        SHA512

                        2301f26f41dd4df6885528cfa1d451f2e204681eef369aec5ebaefc6fba9d9803929fb565295e944b14155557425a0ba048d99cd8f345bccfe176247604414f2

                      • C:\Windows\{FA89D2DA-2158-4fd3-BA86-49C896048EC3}.exe

                        Filesize

                        197KB

                        MD5

                        5107b16851a1baaa867e32ef3631202b

                        SHA1

                        569bd0d1c5acea405be9dcde4ab5a0535a2151ea

                        SHA256

                        bac1119a6a8774e8a5acfd501b306536321b2e1bd81af6755897f99c221b81c7

                        SHA512

                        afbbdabd3fd063dce1d5c4af377f38b64e259901cf565a0220b3be5f518c17970ee36e1be85c9266b2f53473e58f39fc1fb05259cc52824d0104b26b1bfdaef3