Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/04/2024, 04:31

General

  • Target

    2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe

  • Size

    216KB

  • MD5

    2588a529c965c4a4674a457178b14b94

  • SHA1

    86af6a3acb4cf77e5dbbb5c3fc9c3e982fef39d7

  • SHA256

    496c27cccfb19172955eac958f3f06609e9bdbd196e2c856aa9b2d18b8f0d389

  • SHA512

    c09f5ef268f9022d5b1adb2f2197ad2711c7b5f66d5ccf276de8f20c3358df7d0a9d03e8d2ec2e3f7a1658e2d70fdeb351659e33540e9ea072b718cccb691201

  • SSDEEP

    3072:jEGh0osl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGylEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_2588a529c965c4a4674a457178b14b94_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe
      C:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe
        C:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe
          C:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe
            C:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1980
            • C:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe
              C:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2724
              • C:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe
                C:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1632
                • C:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe
                  C:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2300
                  • C:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe
                    C:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1672
                    • C:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe
                      C:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2064
                      • C:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe
                        C:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:384
                        • C:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe
                          C:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1600
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C2CCB~1.EXE > nul
                          12⤵
                            PID:2364
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{224EC~1.EXE > nul
                          11⤵
                            PID:324
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{46B8C~1.EXE > nul
                          10⤵
                            PID:1740
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0301B~1.EXE > nul
                          9⤵
                            PID:1696
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E15BC~1.EXE > nul
                          8⤵
                            PID:2772
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{42070~1.EXE > nul
                          7⤵
                            PID:1768
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CEA30~1.EXE > nul
                          6⤵
                            PID:2760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9E41E~1.EXE > nul
                          5⤵
                            PID:2372
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{37C87~1.EXE > nul
                          4⤵
                            PID:2432
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{21D9A~1.EXE > nul
                          3⤵
                            PID:2392
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2952

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0301BF47-F0B3-4a0a-B013-8CEA48B6F2F8}.exe

                        Filesize

                        216KB

                        MD5

                        a75ad12bc725581e272499ec250a1656

                        SHA1

                        f83636d66adb1da74a1a166cda95a670525eb9af

                        SHA256

                        b69158fe2980b48b69cc3b21899ed28640b1deefc0af3fd76ac9e70c53946f75

                        SHA512

                        58290447bbdaab6849e8256acacf0c7df20fa74a3dc2a05895ea941c3256acc7250f2fc3d56b83ac15d24391712a5df41bb8f0e9eb89e60ab0e7a8231ab1c7fa

                      • C:\Windows\{21D9A942-55B4-401f-9E58-1ECEB991C29F}.exe

                        Filesize

                        216KB

                        MD5

                        354da6d5761c3ec7b01dd928cf7195e1

                        SHA1

                        962667e71eb067183f138fe23780898b7c5f4eb0

                        SHA256

                        61eae0570291a575b7b77bca6e2bfa83a3ea0095ed80ce974883e957a4f2f3fe

                        SHA512

                        b9e4ca017be01ebd2bb48dedabd6837596cf05ac7d9ebdcce34dce52adee82aa03a24de8ef2d9cb78c3ef806b4adf0115c3846f01470d63984d37199597c512f

                      • C:\Windows\{224EC8A9-A1D2-4c0c-BDA9-F4058489E6E1}.exe

                        Filesize

                        216KB

                        MD5

                        2583c36f666f1a49f65b65a1521d84f7

                        SHA1

                        e458d25e117d739f699b186fd48ed71628ec9f06

                        SHA256

                        8d6e160131a6655eff4819c98e9940ac4736746fa9d122a0be1254d692296b91

                        SHA512

                        33956c320917be4894d0c22ec89281230e293e004de78bbf820b91546371a753c18143f0875fef6d1d4a091a6c3492f31d1fac7f71f6cf4bf8c5e0bf5dab094f

                      • C:\Windows\{37C875D8-B11B-4e83-94E0-2F4D68BF92DF}.exe

                        Filesize

                        216KB

                        MD5

                        b2058a6948a17fed09adc732c4b5c548

                        SHA1

                        98c62acc70bf8f5f27c3c6eac91ed2d566b573e1

                        SHA256

                        d308b9e9bf6e0e684da9efc2c5864211b173d3c9f36da02d0e8db4c5638996c7

                        SHA512

                        01b2d455566ef8d34a0ab794f67975dfa0670891e4b11c09cadca7fd5ba7fa7c8b24a653db5f1290345a982d1684cb8e41219f13d35c2f169d0096e009405306

                      • C:\Windows\{420707E8-0E55-482f-AEE7-680B9041D4BA}.exe

                        Filesize

                        216KB

                        MD5

                        b4462858e40a5525b7d64ac6511cd5bd

                        SHA1

                        860d58a0fdb3f5477ef83a98bf94686198b8c20c

                        SHA256

                        10e9d5dd469a3aee81e80eca207f99ee60d6af08849a4eb7f7f35e893b80b8a9

                        SHA512

                        6447a84c6e485bf62ecd18713b3cd13510ae90fbed5a00b95cb328a9b85f43d0ad7e4623865748851c0d391682a259037678dca90bb8bb569ac4a67302393dfe

                      • C:\Windows\{46B8CA26-A859-40b0-907D-390E89125A0C}.exe

                        Filesize

                        216KB

                        MD5

                        0518a3b0f971b311b71d5cc6fb8e9c69

                        SHA1

                        75d58b9eb4aea0906c85a6d71a14db0c2bdfdc3b

                        SHA256

                        b788b6429dee8e3f2df116667db3d347af3b4fe6d3cc5e7d87d05e6c526f77de

                        SHA512

                        90693fbaff81789a765107be34391a6629bae3ca174f010f419b0000d72cf50fa7148e095c9a8d78d365ad82b7aba554d650062c9fc27fe0e754c7924cc72908

                      • C:\Windows\{93FFB8B0-5D94-4c8d-917F-B277723A2805}.exe

                        Filesize

                        216KB

                        MD5

                        6bb9e0cfe4409db5ad0cfee6c2c91ed6

                        SHA1

                        12719d06a8c61be255c236705266639bc6a89ce2

                        SHA256

                        8a68a25b55efdb43f29b141fd9bafba6c96a81d97f42060ced08563e0e571dfc

                        SHA512

                        7017e9063d546f01a3ba284f19f61171c14ab9f4cfba759a106866e0b03c379c79518ea5cf295c5f31d36324c47d762c6c5f3f22758c28811b298ac76d8fe7df

                      • C:\Windows\{9E41E031-4330-4cbf-8A8B-9F5478C44520}.exe

                        Filesize

                        216KB

                        MD5

                        7804b15ab7ca881bd0afe7f6eca728bb

                        SHA1

                        75832a289dc9272f52d742f77625e4c45c327ccd

                        SHA256

                        64287cda1b2c80ed68cf1f1e3194077e18e7a04a83c9bf35659663cb83ef0606

                        SHA512

                        bf1900b80458b2c06bcac6b53a276f7080bb4710a072601f4865b90f540b9dafd86602a64854297090e7ef40567e1fc2bf8932deee011de84c163fab318932d5

                      • C:\Windows\{C2CCB223-6A7E-4449-B9E9-37B36CC11ADE}.exe

                        Filesize

                        216KB

                        MD5

                        d877aaa34745327565816c7f97499081

                        SHA1

                        f9263668d81e76fd5d56ac41f5fc3180bcd168db

                        SHA256

                        09b4f64cb31695377ab51ae5c54a5f89e398bd0b584c94a4290f4945ef241461

                        SHA512

                        5f49980cf644a60c860ee0e12418259df23c46c16a4919f63d24b090cec92a29b77e5db7d9682c8f0920bea23606cfda118168a16c0732ad06ad0b5632d0c6af

                      • C:\Windows\{CEA30694-BDDA-40a6-A2C7-28371DB7E41D}.exe

                        Filesize

                        216KB

                        MD5

                        b21016b9aef3ec8f686d4db609c5e1f3

                        SHA1

                        db8438b9b3b2b1cbc2fc339120d7e4900464d239

                        SHA256

                        ced8a84d4d9f831974692fe42ecd69af3e0ee7d54c86c1a13f3212163b12194b

                        SHA512

                        0265b01da453566c7c6e3dfbad16d21e4efdf88bcd35b25bfe2222c012b82e5043f1db6778cc3369200f0020e39178fb977136a3981ba39e257984a8d1605a1e

                      • C:\Windows\{E15BC337-EE2E-4555-B5A4-ABAEEA3E8097}.exe

                        Filesize

                        216KB

                        MD5

                        9e8fd5dcfdffc1cc6fd09d260f44f367

                        SHA1

                        355c0a48909ecd11bbf7c1a0b61b3e4a115abd02

                        SHA256

                        c8d41e54e79feb57e110066318cc1b5ad5eea1b4bdab323019b9f78230f24123

                        SHA512

                        48448e8e5a0b509a0781a7f614736c6a39e694ce579a05420d072a84cf0d1d43009be698c09fb7e6d4ef3c9f353bf6a926b6dc97ebd65c7ec8e36e7b8330b212