Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 07:51

General

  • Target

    2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe

  • Size

    168KB

  • MD5

    d0920931293b2f3b62abba80afbba686

  • SHA1

    bb2bd8294ab35e61be27545de1480070c1d74faa

  • SHA256

    bfd24ac56e9c57dd1da071d247a19e7e999aba31d912ad985b85bd1deff6b293

  • SHA512

    e00f3ffca5b4e5a08425aad31b056cae1b76a83d7df5caf03b87d663be6e3395a3500c8be5fe02fe73d8cbdd4a239c18a4bf946728ed00f30ceb52a3ea1964d5

  • SSDEEP

    1536:1EGh0o+lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o+lqOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 13 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-14_d0920931293b2f3b62abba80afbba686_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe
      C:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe
        C:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4640
        • C:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe
          C:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe
            C:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4208
            • C:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe
              C:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3656
              • C:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe
                C:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2456
                • C:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe
                  C:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1848
                  • C:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe
                    C:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2072
                    • C:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe
                      C:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3076
                      • C:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe
                        C:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3600
                        • C:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe
                          C:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2120
                          • C:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe
                            C:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1968
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8E77A~1.EXE > nul
                            13⤵
                              PID:4740
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B4115~1.EXE > nul
                            12⤵
                              PID:4392
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{229E5~1.EXE > nul
                            11⤵
                              PID:3164
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B1909~1.EXE > nul
                            10⤵
                              PID:232
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A57CA~1.EXE > nul
                            9⤵
                              PID:5096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D7A31~1.EXE > nul
                            8⤵
                              PID:5116
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E640F~1.EXE > nul
                            7⤵
                              PID:3332
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{69555~1.EXE > nul
                            6⤵
                              PID:2072
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7C922~1.EXE > nul
                            5⤵
                              PID:4256
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FBC01~1.EXE > nul
                            4⤵
                              PID:2912
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F7E95~1.EXE > nul
                            3⤵
                              PID:4060
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4988

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{229E5936-ECB8-4efb-BEFB-5E5A1963155A}.exe

                            Filesize

                            168KB

                            MD5

                            02ceee7830acfd0fbfe4fc99f7dd2776

                            SHA1

                            b2f09e751e17329d61e5835bad095ce010f3ffd0

                            SHA256

                            e79667dc6cdf6e3b98fb6ec7e09aa96ad95443f7d8c35dfa5a328b0b419e0dd6

                            SHA512

                            3c9a1b61690e86eddd1bdae693be99c44f1cbc6ce47834146baec48f4a40db77f62c7ec40786150d4677221148e80fb46d4913e498eeb5d940d9a5cb81d0882d

                          • C:\Windows\{69555CDF-87E0-4a13-9161-002DF85F09A5}.exe

                            Filesize

                            168KB

                            MD5

                            1c671dc2a43e8748b531646e8f734d3a

                            SHA1

                            f9e3572a29e04f440453e1c22e6c11860d4cda94

                            SHA256

                            e0cb5b1e29b530af5664e8ec61ad02a39f545d033930760c2b31e858bc7aeafe

                            SHA512

                            3db72f6c6de7609f7158859f268b6ae0526dc7b24da466bfb1c1bcde4e5d29cfea652e8a6f47e1763bbefc68c9597d2ec7d1d487f0b16d2366fc6f0f8e6483d1

                          • C:\Windows\{7C922A91-0ACC-4d97-AE13-ED9B4ACFBB36}.exe

                            Filesize

                            168KB

                            MD5

                            2069532567ca499a3773f7640a00bebe

                            SHA1

                            3c8b1afb8084ab33189cbc49f844a57a7c197ebc

                            SHA256

                            60fba0dd134b407772c2a26d5df796c66c68c25e831a8851bad6bc7413e5ea33

                            SHA512

                            0f80487f3b5bf7e08521a4f19d166480ead787994a9d536db09fda9c19ca38bb12a0642ee68339c98c3036692066a27939b539e5e3bf5a0952292d5960b527af

                          • C:\Windows\{8E77AE47-01DB-4e6e-B86E-45A60B809CCF}.exe

                            Filesize

                            168KB

                            MD5

                            05f4e1761e89a2bc52205d84984ccbb3

                            SHA1

                            daff1465e9bf57be786c01414cb3dc4f7a5d762c

                            SHA256

                            50126ee48f1987030e250e8ed37fda621cbe35f840c39d1690dd797faf02b0d4

                            SHA512

                            2486fc9ee8e99d6620c0aeceadc5c2d004378f7032b161b88cba524b6ba1efffeec8e2d0a11934a6163f2311ee0cee7c9853c842e3078bce1de8a54ace2908ad

                          • C:\Windows\{A27A2161-1F98-41ab-ABEE-661024CBDC80}.exe

                            Filesize

                            168KB

                            MD5

                            42bd1b03bbe34147a128fe4befa6604d

                            SHA1

                            0d265a7eee9847f93aea7a343d165f621d13c603

                            SHA256

                            e039430f0516d210b0a50ac35868829715254c44c4f6f10dc235476a47a30c78

                            SHA512

                            42a490ac3ca0b17e640226d8b7cc08789bdb67f85f2a4c0d0a0f0e7b2b51c300bbf6f9245bfc3d070b7b7f5bc692371cf5be3192161a917b5d0a0b60a2fe2302

                          • C:\Windows\{A57CAC74-E85C-4ded-8122-F1C2A30F1B1A}.exe

                            Filesize

                            168KB

                            MD5

                            2aeabde898c9aa7aa6bbc8cf4ca190b8

                            SHA1

                            1edbe838e91915cb4d2cd0920e7ff472b09a2b61

                            SHA256

                            de1781aab557faf1eb863ca6fd2c7b42925ffd3fc8211ecce0ce39e11a3a22db

                            SHA512

                            acaf9a3ffc258ea4a03392f32f818bc4c9d972fe3a64c37ce52105902e8931ec439fd84f9be0a88a243e9e349a6fafdd4387bc40c21de4059274bb4dabe8657e

                          • C:\Windows\{B1909B6D-FD0E-4fc6-B710-54B5328EBC36}.exe

                            Filesize

                            168KB

                            MD5

                            b5053241b57ee8b9b248c813caafbe7e

                            SHA1

                            50cbbba37de7e9c62c8dd10b5e81d8fd2dca50b6

                            SHA256

                            e46c9af3fd162bc2448594b45220b47374764c9cf22d3930750c2505fd8ce06b

                            SHA512

                            5da5d01224438b224dd678b7349518bd5b7774dad823efc79d9e4b189bec77b92ae921e6f39132f930d9daf52f702961d95a49640bdc093961c3783f463fb24f

                          • C:\Windows\{B4115155-B8EA-4e28-AE41-64B60EED43FA}.exe

                            Filesize

                            168KB

                            MD5

                            ff09d8ff7dbd622641322fe4dfcb1993

                            SHA1

                            024234cc9e8c67a3257d62a82a3dfcc180a996c4

                            SHA256

                            0f4f8ac9b5ee75b225ba8a87315db0a8170e28042667dd34988804835d50628b

                            SHA512

                            4820760833bd36bb5341d8d4ffa2d81b678d35e8eb3a057213ae354adad203cc8da761e03d33fcca1567f099f266ba356bc9328d198f576bbe7353d200196d36

                          • C:\Windows\{D7A317B0-2CDA-45f7-A7E7-FCB20A0A6AC0}.exe

                            Filesize

                            168KB

                            MD5

                            df3a2a903cfcaf162c33249beaffb639

                            SHA1

                            eec1e5e5bbb921ae3a131328d2f77480f4633c30

                            SHA256

                            4ab1e32e896b0a5ac150cf62a100de916d21d2411a9d042a96a8ae51707111d4

                            SHA512

                            1055ea25d191aece082e171c7592398944a0601ccd8805b3956aa50171d31f6acf7b67de364f95ee6856ee6883c4ae7258c18a9a6f42f1244196ce2a7d60018b

                          • C:\Windows\{E640FC0D-50E0-4f40-BD94-6944E5F36590}.exe

                            Filesize

                            168KB

                            MD5

                            c363ef5b6946456e4746dcaf23b3a729

                            SHA1

                            793eb82ab8db5f08d729e5a5bd8a3c150f4898e1

                            SHA256

                            1a7cd15bc944c15b188ae8d78e2f7319b0967f24ca77ce9f8536dfc41b3b17d4

                            SHA512

                            e9ab76d07dc95656654d53c9373e03b0d2cdba844cd7b888a39df3bb5478181f9767063d9eed2135a5edbe4e85f2e8bcbb125ec0714c7ba69bab69db962d9c49

                          • C:\Windows\{F7E9503F-124B-491e-92EF-EBFE41C50FF0}.exe

                            Filesize

                            168KB

                            MD5

                            b99a330e5c7fabf61c347c52a44c5ba8

                            SHA1

                            ac3d270415775b68292729f06063b05ff2cee469

                            SHA256

                            b5f18f355a91d3d3c47e13c3ec7d92914de6ff135b080ef6d09d67c0e3b52a4f

                            SHA512

                            8c4bc99f3d18094084dd8d436b96bd0deeba83203841b7c2380139251d21acb198caf9e682268e046a239b320f9c850d93383b802314ff3b722482d4e07c1a10

                          • C:\Windows\{FBC01588-F34A-4202-9D3E-0BC1968E26BD}.exe

                            Filesize

                            168KB

                            MD5

                            65dd01fef049d65f1680d2020538e7cf

                            SHA1

                            cf67a80dd6dcb0132f9d40465dd73ccba07b13ab

                            SHA256

                            3de039c1621870c301fa72430fa4939fe8e8eaeb4d852bfd4ef3b39065aeecce

                            SHA512

                            cf48a76fbd467e90a1903df37c363c220e94253c211adf467252bb550eef49b519ccae6f6422fdce88a0d6bea35836a061b516c67b48a02c9df5e9df79771cf2