Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 08:33

General

  • Target

    2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe

  • Size

    180KB

  • MD5

    47a12bf9c16848b900a001fd00083c04

  • SHA1

    4360dd715ad3506b3e26eff7463e9bab3855eb95

  • SHA256

    f5b71caf894fb5f50f88d162e5a4ce119c0823cec207b0f00b414e330b225fee

  • SHA512

    554e8d7b7d9550ec528295cf5256c297aebbe1f5f9147cca3dbfc111e43a1d5865fde57ec31770b41a42ea47a5b319de7e582888ff70fb0954b977d23e94d7f4

  • SSDEEP

    3072:jEGh0oclfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGGl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-05_47a12bf9c16848b900a001fd00083c04_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe
      C:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe
        C:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3344
        • C:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe
          C:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe
            C:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe
              C:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3156
              • C:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe
                C:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3436
                • C:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe
                  C:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2224
                  • C:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe
                    C:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3864
                    • C:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe
                      C:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2620
                      • C:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe
                        C:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2772
                        • C:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe
                          C:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4516
                          • C:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe
                            C:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:704
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D6B00~1.EXE > nul
                            13⤵
                              PID:492
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{EA8DC~1.EXE > nul
                            12⤵
                              PID:1044
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D9E99~1.EXE > nul
                            11⤵
                              PID:3828
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{37B0A~1.EXE > nul
                            10⤵
                              PID:1844
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D9BDC~1.EXE > nul
                            9⤵
                              PID:4840
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{35A61~1.EXE > nul
                            8⤵
                              PID:4568
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{979D3~1.EXE > nul
                            7⤵
                              PID:4908
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BA167~1.EXE > nul
                            6⤵
                              PID:4000
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{57FC1~1.EXE > nul
                            5⤵
                              PID:2012
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A13ED~1.EXE > nul
                            4⤵
                              PID:1096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{09589~1.EXE > nul
                            3⤵
                              PID:3512
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4516

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{09589A1D-84DB-42d7-9A67-0E8428FCE3C5}.exe

                            Filesize

                            180KB

                            MD5

                            b478687c855704c0b34ace8c21330748

                            SHA1

                            9d5524f2fb0c74e428abff4d7a2861ef8dfb77ad

                            SHA256

                            d7a52d31dba7ecad7f14c8e32ab327d4eed7f87ee6a13628495d7c0b3808aad2

                            SHA512

                            001d70d29c09ebe5f4ab7e0c9123747a65188e1b9aaa304857223844aab5f7d68a37fd67347a9de1bd58d81f8bf7dc00e211e91820d29247adff8dccaadc8ac8

                          • C:\Windows\{35A61D0B-6940-4aee-9E92-1FD9A4926947}.exe

                            Filesize

                            180KB

                            MD5

                            f293143cadda4a80d41b783f736c9e85

                            SHA1

                            191e183755e05446c7d2be8a9f7b10907c396cf5

                            SHA256

                            30eb2dc755f5bb07b8e30bbf7dade6e76b22409e74ccbb474129d05f6bf91a93

                            SHA512

                            7867c42be48e5ddcd8bb7ea9fc9434284899e303a210fb84328e306fb44dff6f731fe36fa6bb2facd870c775631680a812d7682efb29194f2700fc8169eae7a7

                          • C:\Windows\{37B0A8CB-AFEE-4740-95E3-3586C0BFD6A1}.exe

                            Filesize

                            180KB

                            MD5

                            0da2da805e474e70918bac92c761299c

                            SHA1

                            72942f9a35cbfcc72d008564f108216feb19c7b5

                            SHA256

                            6ea8112e8cf4b3aa3d620632c03fceb41cdf5a97589a4310d40ddc2a6acd7f62

                            SHA512

                            a71b536d3ed524930c7ba07c7c95da40426cce414cc0940ca82ce83ec1b031ed0456cecb227b05f05e6638a8caf995e1db869fe00aab189687900a47058e76f5

                          • C:\Windows\{57FC167E-89C4-4d2b-B060-6D4081C76D71}.exe

                            Filesize

                            180KB

                            MD5

                            1bd7336e0a8ace05b2f8b5915bb1e1a3

                            SHA1

                            983da0979910a34f02c948c964e145f86be68fda

                            SHA256

                            f9ea2b2023803d679860e2f3b03bc60f449adeb5fd6f1fa905115c2910669904

                            SHA512

                            e266b6da20b3bdbf22b62d6c4a90d6720ee8af7994880f30abc950950ccb76db8a03884dcd45812860ffd0876d82b23b254794fdefbc06b58e6ed1917f53c90d

                          • C:\Windows\{5BBFF565-F726-4c9d-86B0-AB7917669C75}.exe

                            Filesize

                            180KB

                            MD5

                            38383553f68968ac48db8ad446600ec6

                            SHA1

                            c2366bd6298757801e6b8f0931fbb44f134aa494

                            SHA256

                            26fe320f06b21bc45e0aa63f70313c78595bfe093d4cca7c786bff4c5515b8bf

                            SHA512

                            c899bfad64687c41e8992ce360e50996214bbd05c1ac8b309c210902e91638467be88a7550644054c581d2d8c6a0a6cad9e011febccf7bd03dbb1aa2b30df700

                          • C:\Windows\{979D3B7D-3A29-4ba3-9CE1-A5634DA08444}.exe

                            Filesize

                            180KB

                            MD5

                            3114a1c060cff273c658bc32dae7e9f9

                            SHA1

                            1e9079dc467986cd381e59829a6cb8a0b35648a3

                            SHA256

                            1f22b3435ae3d7c737d8f75ffe5ad30901594735006edae8a66e165c36e42f4a

                            SHA512

                            2bc64755543f6a42afb9b8509ed3c4883244d87685566f365b627c8619d8ba5399969baec3bc496c5f90ac76ee579ebe5b0fcdabacee991ff749151df1459882

                          • C:\Windows\{A13EDF19-4A09-4805-B580-96D8EED92DB2}.exe

                            Filesize

                            180KB

                            MD5

                            62bb3f3b5b3ff6b86d4d0d990ed0197e

                            SHA1

                            a51c3fdca3525557592113678b4f97ea68f5bdcc

                            SHA256

                            fa89aeb967e30fb15abab6b2074f3dfd8ed42d913db1682c5b30bd9be32fc0f3

                            SHA512

                            9c8a0909ad4ca1b49cbdeb55ca01716c67b8d94889bd742f8bc6f7f0b6ddce16fb4944e437383b185ac503ffe23d3c77ff355dfee0f21049acee728f4bb901c3

                          • C:\Windows\{BA167AFC-238D-486e-9CDB-A4D5E4A91664}.exe

                            Filesize

                            180KB

                            MD5

                            301835b067aa84fde1eb1c1348e4a7d2

                            SHA1

                            4cfe63cc9ca389015d552b6ebcd699cb7430a424

                            SHA256

                            1f2a8636ca339c67afb9b53479df76697437a6a2bf0b94f257362151050d2922

                            SHA512

                            26f08c6f38c48fe86375b452c09ae0bf89a49e66ed05aec4edc41103b242bb6117cf8dcc62bfbeb5ede18a8547bd5c353351d80de9b20d1f189b3bdb5b1dbccc

                          • C:\Windows\{D6B0066F-4534-42c1-9417-68B22A18B008}.exe

                            Filesize

                            180KB

                            MD5

                            68344a6729ddc8d690ad7cebe8a2895b

                            SHA1

                            42bea27340aacfe82764ce453e182d4d10290932

                            SHA256

                            0838649b9851a0b4388e0e0e03b38fb6e332d160a037126f6d326d763b856c6a

                            SHA512

                            fd36aba1188992c441877b024c58c753da3b32911221d4d62dedc90aa7a7606284a69b348d2f0a79cb78c0c9137fa113d640ab8940cfdc7b299bcb71dad4cead

                          • C:\Windows\{D9BDCD7F-83C1-4492-B472-E557188A57C5}.exe

                            Filesize

                            180KB

                            MD5

                            4edc5736cd8b1af2fbd8fca468038ce3

                            SHA1

                            98183002b718cc50faf95582b6fa0eeab05fd6ce

                            SHA256

                            927b2423fa153533575c65773adc63b91997069a04bc9009076da982107753c8

                            SHA512

                            874d2dd20adb20f2f6769cdf82562f2d036d43cbf6a480f0a3ce7d0263dd05895414e43b41bde2104166aa44451ef7e61ba2640f2e5a9d04d8d2d85a982ab8de

                          • C:\Windows\{D9E99E8C-111E-4bc8-A5C6-42FBB9AB300C}.exe

                            Filesize

                            180KB

                            MD5

                            91c83711996d4105cc715930cc75bf9c

                            SHA1

                            02c315481f9c306455455b165bf3c258e9bb8096

                            SHA256

                            73834a905678d2e9e7b68ee80380dec6aed82f0a1238e20ae005cf088c99ca01

                            SHA512

                            2c3551b66456161229290989ec3648022b58cb6e3847e4905683644d9f7fc7816e63d7dde196fb2cbcf964503505fecc477d84f38288502e043b0d2ff37de905

                          • C:\Windows\{EA8DCD9A-1555-4fff-B66A-64EA4019503D}.exe

                            Filesize

                            180KB

                            MD5

                            df032f9de2af74bf0d4c5ae42791da8a

                            SHA1

                            ea84b9d69c114745f81aaaecedbb0aeacb49726d

                            SHA256

                            07b9503384444eb6c15da88cd6b435db0c138ddeb1dace0617e5bfa227c7e557

                            SHA512

                            79d4d412bf337e76c6e05065056b2fbb00450daf64287aead11a79da851d7ad6f13b29f65439baf02c0e131ab92132d516563a7ba3c1009275da559c2dbbff9c