Analysis

  • max time kernel
    162s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 19:27

General

  • Target

    2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe

  • Size

    204KB

  • MD5

    1c98473e2cf3ac1b4b7648652e2ab3ff

  • SHA1

    e366129cb220fbd7616c3140dd84d41768a6ec17

  • SHA256

    d493ae1bd8436b31cd43789c20901f2a99c51946a1d5062662f8f8dcdc4d3203

  • SHA512

    5e8a37ba446eec068bd2bd300de8e62f01c4665eb59c5d751a4873fe31c6a617d158402d358e31ce2835a45ad8078083f35c06000acae69fb8a200cc2c146810

  • SSDEEP

    1536:1EGh0oxl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oxl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 10 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-04_1c98473e2cf3ac1b4b7648652e2ab3ff_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe
      C:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe
        C:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe
          C:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:660
          • C:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe
            C:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4736
            • C:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe
              C:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2320
              • C:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe
                C:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                PID:3292
                • C:\Windows\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe
                  C:\Windows\{8C3F79EF-705E-4981-8C28-4F7D7F2A9CDD}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4772
                  • C:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe
                    C:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4236
                    • C:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe
                      C:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3128
                      • C:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe
                        C:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3976
                        • C:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe
                          C:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:4536
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BE4E5~1.EXE > nul
                          12⤵
                            PID:4316
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A88E8~1.EXE > nul
                          11⤵
                            PID:4708
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3D260~1.EXE > nul
                          10⤵
                            PID:3196
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8C3F7~1.EXE > nul
                          9⤵
                            PID:1768
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3216F~1.EXE > nul
                          8⤵
                            PID:1876
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7D27F~1.EXE > nul
                          7⤵
                            PID:4520
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A438C~1.EXE > nul
                          6⤵
                            PID:2468
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{58F98~1.EXE > nul
                          5⤵
                            PID:1684
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2CF06~1.EXE > nul
                          4⤵
                            PID:2836
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{58167~1.EXE > nul
                          3⤵
                            PID:3152
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2708

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{2992DCB8-406A-44cf-9801-E4CD161F9366}.exe

                          Filesize

                          204KB

                          MD5

                          9c5885a549ff9223f08e6b860123f82b

                          SHA1

                          737509c51c8c2971219452dcb4124431fce886ef

                          SHA256

                          69f845f297a9d1dd5168ad4d1825ac88bd289be07446d1336f85ccda2737b55b

                          SHA512

                          94586754d71d80455788cd67a8d706148f19fff245602d5ce83eaa2824eeb381d39a5178a848c8de46ae6e98a738e44a9e7a789c9f7dd2e7c088e22063de342e

                        • C:\Windows\{2CF06693-3272-4877-9E93-115C6F10E1D2}.exe

                          Filesize

                          204KB

                          MD5

                          541d6a0b76c9fe36aa1b6750b09aa004

                          SHA1

                          bea1a203cc848ac26b77fca759bf53eaf0d3e631

                          SHA256

                          3cebdd57ee4bf26bcd0ae38582b8ccf98242330bd654eccc59867f7ba324eaaf

                          SHA512

                          f4178cafff9e234a1740eb0837037695b29b2573904e78ae17ee39f11c2837e6ce854d7326a4b3e438302c94bcbc9edd7c43d788b1cb5e5d54033656024ebfa9

                        • C:\Windows\{3216F4C1-4F18-4afb-8AA2-376279BCCA59}.exe

                          Filesize

                          204KB

                          MD5

                          9ce160f89a2163116db8530859f19fbc

                          SHA1

                          b7e0bae91bbf7d72ae38e759b9d11bfb9948b2a5

                          SHA256

                          d2e785b9193f950b143ba8e5956eec61ee07f7862b1e247f6b69638d1804a421

                          SHA512

                          125e0930cb763d9b953e9707921ec1a3107f1bd3a9b57aefc4cd9c02236dd9562fc1a21fc058e8ff617b8f29a0d14ba133ae7ce45437cf235031beb67e100a49

                        • C:\Windows\{3D26031B-FF3E-44e6-BF38-CCD32337E0F0}.exe

                          Filesize

                          204KB

                          MD5

                          115827388a4b954dd2f438ac82700243

                          SHA1

                          632a472c8ef8ad3a21415360c430c8392805faca

                          SHA256

                          a3d67a13cc1ef56c83a0bbd378786a18f9bfa238734f85119bdf74d677c8f129

                          SHA512

                          1f6eb9b12db1658c9ff8075f175bfa5a7f0a72efeac0a34d661d0e87a044c368bb1f177dee0b36c1413db8d9db50981e0d8673ed5a4ee13b49a9f3512e040844

                        • C:\Windows\{581679B3-6437-4f8f-B099-A1A1233075FA}.exe

                          Filesize

                          204KB

                          MD5

                          d5cbcbd81b0bdcf1a233ac046fc4b01d

                          SHA1

                          546cc8f1a7af13bbf24ad9e4a0bd4e8a0e456e7e

                          SHA256

                          366ff8d24510ded75ff5b757bd0abfecffafc1ef054e52d2fcb987aa50543d42

                          SHA512

                          d85e4be4e99297e75133523d06b88d1c4f347bed9631363d938b4895176029a5cb5446175b13242b7085c24583f54ca18f4a84e591e02793c239fc6e1fea8a0c

                        • C:\Windows\{58F980AC-8121-45bd-AD4E-0D1829D37ADB}.exe

                          Filesize

                          204KB

                          MD5

                          a70faaefa2d1a2a21cb9601e112e1f8b

                          SHA1

                          9cc69a2aa127b89660bb32f64f022e762490dc38

                          SHA256

                          0c574de07aead187001d80a055189224bf01c4ae83bdba9937ebba605b3f53b8

                          SHA512

                          a361532581eb62970b7f2887651b6ddb220a0b0c2b13248ad196c530e21ab98c818d7392a8fce84ee7afc599bbe8e82c315dc9bf9f3e4456da07be908805bd85

                        • C:\Windows\{7D27F238-C27E-493c-A642-7F90AC5FE034}.exe

                          Filesize

                          204KB

                          MD5

                          c2afaa7b05dfef6def0a906eef1d9d0b

                          SHA1

                          7023701428a362211dbcdd769de92a9375d274ac

                          SHA256

                          b746291f1523e56adcc53ab03a93ecd40e18deab66d2f0e2448742af061505d1

                          SHA512

                          cb9f34d5f32301c0289371626fa86f0f36ca32337934d8d64121fbcc74bfe57a8915b3cb6df8a337d49642bbe8be7e07792ff63f85fedd707775fbd71272d6ca

                        • C:\Windows\{A438C09F-5636-429d-A230-B93E1CCE7BFE}.exe

                          Filesize

                          204KB

                          MD5

                          b4134aa0c2d5e493d8c406ea7d0e4d4a

                          SHA1

                          5d4819bc655b8ed07d772d09b424512a6900cf8f

                          SHA256

                          d58c4b433e22450e2dc0820dceca3b964753b4520d1c14ed130a42c0c3713c5c

                          SHA512

                          d768697e88680434188d973b4b194b767c6af62bb411ee50973168a49517b06effe3a08ffd9571a5a74aa419e6775ccc926c0af3a948bc97ddea629721e831ac

                        • C:\Windows\{A88E8B4C-016B-4adb-9D38-22F4FB0F1563}.exe

                          Filesize

                          204KB

                          MD5

                          42b3087033a5a55730a8d918ecf29b34

                          SHA1

                          2de43c442a19c765513df22b3fd399a2a90a736f

                          SHA256

                          3094cb6879c0e5013778290d875fbe5828d3da15b754bddb6a29fd654cc4859e

                          SHA512

                          0381b2458b9a3012a13a0929ca5339cb4543fb0d160bfe5e6563760200ceef9053cd90e309f7afbe0a03964e4335bd39ae73b6ca787801d0e8d071d43cb0ad6a

                        • C:\Windows\{BE4E533A-CCCC-40b2-B9DD-668E21F3D807}.exe

                          Filesize

                          204KB

                          MD5

                          876441494cf414e4009b4f4cfaf8d3dd

                          SHA1

                          0b2cf16fc4e25dc8af38ad0b4eaf581b53ec6af4

                          SHA256

                          468769341a91119214159c310d14555cf23d87d69c706b774cba9fc45ce809c1

                          SHA512

                          b4f3549b529366af6c58eaafc0bfca6c800446b82d17631320c69bd2ca32191fab760919bfe15d1a858d346f9da71eb4427607fe0c562c441e4e63724a871732

                        • memory/3292-23-0x00000000038D0000-0x00000000039AB000-memory.dmp

                          Filesize

                          876KB