Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 16:43

General

  • Target

    2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe

  • Size

    192KB

  • MD5

    3bed806b5326e661c2e220d40d6c1ae8

  • SHA1

    fd012ce2d06f1a14de88861cf4ed0ba53e75b7ef

  • SHA256

    e62a156b891e54a93d78151071927ed8fbda35123f03e7eaca7ebf9cb463dfb5

  • SHA512

    bd6798767aa1bf9d9abbcb2fed7b2b6dee46a12ebbf1720b6a76c4ad4a83b0cc3b39934b87255bad67c6fac1b6668757274a4e94b41446e1e37baab5c80eb8d0

  • SSDEEP

    1536:1EGh0okl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0okl1OPOe2MUVg3Ve+rXfMUa

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_3bed806b5326e661c2e220d40d6c1ae8_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe
      C:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe
        C:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe
          C:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3880
          • C:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe
            C:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1016
            • C:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe
              C:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4220
              • C:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exe
                C:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:764
                • C:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe
                  C:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3008
                  • C:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe
                    C:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4464
                    • C:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe
                      C:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2128
                      • C:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe
                        C:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:228
                        • C:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe
                          C:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1624
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8BC92~1.EXE > nul
                          12⤵
                            PID:4556
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{068B5~1.EXE > nul
                          11⤵
                            PID:3364
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{29D92~1.EXE > nul
                          10⤵
                            PID:3324
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1F1F9~1.EXE > nul
                          9⤵
                            PID:4320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{50B38~1.EXE > nul
                          8⤵
                            PID:4692
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6E182~1.EXE > nul
                          7⤵
                            PID:4856
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B06CD~1.EXE > nul
                          6⤵
                            PID:212
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8253A~1.EXE > nul
                          5⤵
                            PID:1432
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1DA16~1.EXE > nul
                          4⤵
                            PID:4764
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B114D~1.EXE > nul
                          3⤵
                            PID:4912
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2928
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8
                          1⤵
                            PID:4916

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{068B5474-AD86-4f57-AD2B-513C954195DB}.exe

                            Filesize

                            192KB

                            MD5

                            875bb0ccab9e12be5652abc88fa6d123

                            SHA1

                            cf50a421b2d9a1b1c9530dfeed5ca7782e825c9e

                            SHA256

                            faa74bd9f4acf10ae5f06dee871716f9693f12b4083557624ee4f277c132450c

                            SHA512

                            b003736df5765f4a1ce7f7e3adbc7ee2775a407c1c6db82d7ba00d738add961a4df6d3a264b1d96aeff80947610c141f5a12d2267e8aa49c5deca78fae53f6e3

                          • C:\Windows\{1DA167E5-ABC4-47b4-A211-C91CCA784DAF}.exe

                            Filesize

                            192KB

                            MD5

                            84131d1bb04a16ac166a404a76a802dd

                            SHA1

                            7a14064d2f9b737d73c28691b16b71dcf4e48c7c

                            SHA256

                            eb745fa21b368ac6b6d98feded4530a66350e95d114f6a7231b999c37256cf26

                            SHA512

                            f3237c7752b5e9238345830c1d332be380a132db59814ec82b6a332dabf480ad2e3abd381021e106503d7b948ddf859fdbfe161b9893d07fc5f710d0cfb3dc72

                          • C:\Windows\{1F1F98CE-B847-4c66-A54A-E0DC4B4F5A91}.exe

                            Filesize

                            192KB

                            MD5

                            27f56e5aeec52eea5feb37381cf33e71

                            SHA1

                            5c32be77c81636d37215913a13fdc0f6bc1f02dd

                            SHA256

                            a2ede5183c4f240cff0dff3596e66bd12c5a56d61bef021b30ef6cee400302a5

                            SHA512

                            dc77b523a662ff10e1b230764121415b90b9d43a7edb9e926a83167f76853f555f0a781d24a1a4abcfcadd77fd30d03f0a54f4a183d6ff410a3524977231fddc

                          • C:\Windows\{29D92C58-6A9C-4d70-8228-4DD2A6AB9F3A}.exe

                            Filesize

                            192KB

                            MD5

                            1d5a0a7bd4cd93b028698bd8d3538d10

                            SHA1

                            a9f0114f316d6de21cd6be21698e59104e12cba3

                            SHA256

                            7cfa6b9ab1ad74ea97cc2f74779fc18d8d44446771fdd469f71b92666e3dc0f3

                            SHA512

                            7bd618493361e25de377ca3cb926c23eac1fbfe0a27ba164e2363bdefdd7a17cd63ffcdd6757ac047eec11fbf0dfc2551fe5180f5ec6fc689004e89d7fa80e1d

                          • C:\Windows\{50B381FE-5A4F-450b-B203-A979760822C2}.exe

                            Filesize

                            192KB

                            MD5

                            62ac6f90db0f2904a8bf689a2431c00d

                            SHA1

                            4ac4cde4ee28a2f353d989db427a693b0afc87dc

                            SHA256

                            9a4f2037e59eb00b9638a5a90a04d6187dc30a6bcc092c85e0e3ad784f753e3b

                            SHA512

                            762239e8dddd7defe55f07dbd28e2bec3f246ebdc9cb6184f85f8a84b32a6b0baa8feed01d38746c33fb329dbc6c7dd4549ba6fdd09582de2503d8637b42569d

                          • C:\Windows\{6E182E5F-4778-4077-BA2C-641DB9CCCBB2}.exe

                            Filesize

                            192KB

                            MD5

                            3434d7315b34659f9eaf3a968dd95523

                            SHA1

                            757ee22d837fd3f796ffe9a9136655607262d423

                            SHA256

                            b6821bdd64b44d281a6536afa8c4b4a733ad9bebe8d47d6d3414a34606550950

                            SHA512

                            c85608f7705cc942d6a9bf5f2ac2503bde5478b68e3687269ff12c751baa32359fdb7706b8705fed9b5cd158ded335ae860556996b52326eb3e57b9284280b7e

                          • C:\Windows\{8253AEFB-C7DD-4c1b-A14A-E0E6BFF74727}.exe

                            Filesize

                            192KB

                            MD5

                            b8f66b948a215475780f78c8d9bb6c2b

                            SHA1

                            a51b70b7dd692fc2d93d6acba64df56ae1eb5849

                            SHA256

                            a331938ce60c86ddea1453085b69b856ec2cbb1d75e38e572e7aa3c6afaf22f0

                            SHA512

                            e3e3a39e39f5232a7d8da0dcb94805d05504d8e6fbf2f89c7508ae2de1f7b1669069f36243a16043a56e62d9c4874db79dd2d8602f382f8f30e3ccee8f5e5421

                          • C:\Windows\{8BC920C6-40DD-45bd-865C-CC4488D37316}.exe

                            Filesize

                            192KB

                            MD5

                            c9108bf6dc6501ac3b2f96428f78c0b2

                            SHA1

                            093e29f8ccb6817b0074a43e148454aa0888f0c0

                            SHA256

                            491ace39ee864b562b0390d2d19630cffe7a48ca1ca51ab1c99b979c1af1491d

                            SHA512

                            fa0d9cde0aaa45ef502c591658dc98dab3502f5a6f41f59001ac39d37c85e674d4acc11225e7244e62ea8f4cacefa4c44d40557ddae01dd9896205d4c1a2366a

                          • C:\Windows\{B06CD87D-4BC5-4e9c-8983-A27BB811F42F}.exe

                            Filesize

                            192KB

                            MD5

                            729a746695ecfdd33259e5c91f0a0e81

                            SHA1

                            9013a27126dcd420452b08ef9173411a1109f9d0

                            SHA256

                            bd97bf19be822870578fb75569c993e918c85763c0e56b44cf1039002bbac415

                            SHA512

                            eb1f5321a532b73ab531c53d31f96634660aea51c1919e60659a60176ca5aec20ff60634c7109285f030ec16000d17392d2b235615cf3395e7cee7863676c6b0

                          • C:\Windows\{B114DFDF-0ACB-49e0-ACA6-0A810C8E8EAE}.exe

                            Filesize

                            192KB

                            MD5

                            ebc418a417c5471067faa6bcfa28e945

                            SHA1

                            59bece46dca6a7debbacc12de5a13ca5d57a0299

                            SHA256

                            aa33ea5254d183693d5cdcb029e635eb9d708deb76726dcc8af3830a363b594b

                            SHA512

                            1452e558afa05341d9ff550cbd563a7afbf20b3b369099c519d5a4d1fc7f2577e1c803e0f651de342388c3b9484cb9c650e82ba923ba33535ef3e1a7427ca11f

                          • C:\Windows\{DFFA6E21-29B4-4257-839A-EF487A4C0D62}.exe

                            Filesize

                            192KB

                            MD5

                            dab2ad2e2cd73a0f24660ebb17e2d534

                            SHA1

                            afaa705cdab11618ba04efe8c4ba96ced7ee2712

                            SHA256

                            c853bc7785512ae606c31fed6a66f7be1a69f57b9ff31f06357b3699b989a1d6

                            SHA512

                            3b6f534cc554d79c85d50c17b930868a03930f034e80908811fb3ba9e2aa2e609b0b88fa4158417961726da9920179a50f69c5839a9fe5531b7b3495897fc360