Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-04-2024 09:29

General

  • Target

    2024-04-06_2bf9a6f0b3db71978a28cacfde2ed409_goldeneye.exe

  • Size

    180KB

  • MD5

    2bf9a6f0b3db71978a28cacfde2ed409

  • SHA1

    a34fb5ef91e204b53aaa5c937a6ae73f9d4a6fc7

  • SHA256

    d611bb2796576c3f36c12646352f87ce345a57bc76022b09c72f00599eb1dc04

  • SHA512

    efb7f920dbaeed9606f681dfca6d48ad2c6019a3c69c8dbc96b76fe90f5988137aa7eb70ed4b47e95dfd0e8edd740f2becc36dd4a56467d47debad47aa188022

  • SSDEEP

    3072:jEGh0oglfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGKl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_2bf9a6f0b3db71978a28cacfde2ed409_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_2bf9a6f0b3db71978a28cacfde2ed409_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Windows\{D180B699-3BD9-47a2-8F45-35DF2A0E1D8B}.exe
      C:\Windows\{D180B699-3BD9-47a2-8F45-35DF2A0E1D8B}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Windows\{A76AF912-2AB7-4f73-B9C8-B4F12401D116}.exe
        C:\Windows\{A76AF912-2AB7-4f73-B9C8-B4F12401D116}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Windows\{22B7B092-12C7-437a-A641-8B977A743739}.exe
          C:\Windows\{22B7B092-12C7-437a-A641-8B977A743739}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5080
          • C:\Windows\{5D7AB431-5430-49e8-B909-17CBA49F2833}.exe
            C:\Windows\{5D7AB431-5430-49e8-B909-17CBA49F2833}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3164
            • C:\Windows\{B98E39C7-0A06-434b-B9F3-D37EE46EB71D}.exe
              C:\Windows\{B98E39C7-0A06-434b-B9F3-D37EE46EB71D}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2628
              • C:\Windows\{C354BE8A-C1E1-4fa2-AA0C-F504317FDC40}.exe
                C:\Windows\{C354BE8A-C1E1-4fa2-AA0C-F504317FDC40}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1192
                • C:\Windows\{04AF53CA-6786-4abd-846D-CFF982374426}.exe
                  C:\Windows\{04AF53CA-6786-4abd-846D-CFF982374426}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4780
                  • C:\Windows\{1005C682-B225-4c40-BA41-F13C440E0527}.exe
                    C:\Windows\{1005C682-B225-4c40-BA41-F13C440E0527}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1016
                    • C:\Windows\{219536D2-9EFC-459c-8F88-32749B2B03AD}.exe
                      C:\Windows\{219536D2-9EFC-459c-8F88-32749B2B03AD}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4788
                      • C:\Windows\{8900956A-4AAE-4a5d-82F0-9AA6D4B37578}.exe
                        C:\Windows\{8900956A-4AAE-4a5d-82F0-9AA6D4B37578}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4584
                        • C:\Windows\{7D200EAD-F06D-4c80-ADF2-0533FA18051B}.exe
                          C:\Windows\{7D200EAD-F06D-4c80-ADF2-0533FA18051B}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4672
                          • C:\Windows\{A3EB3067-21F8-4913-891F-8F6FD67E2BDE}.exe
                            C:\Windows\{A3EB3067-21F8-4913-891F-8F6FD67E2BDE}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:3828
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7D200~1.EXE > nul
                            13⤵
                              PID:4420
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{89009~1.EXE > nul
                            12⤵
                              PID:2040
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{21953~1.EXE > nul
                            11⤵
                              PID:1944
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1005C~1.EXE > nul
                            10⤵
                              PID:2788
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{04AF5~1.EXE > nul
                            9⤵
                              PID:4684
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C354B~1.EXE > nul
                            8⤵
                              PID:2176
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B98E3~1.EXE > nul
                            7⤵
                              PID:2096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5D7AB~1.EXE > nul
                            6⤵
                              PID:3076
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{22B7B~1.EXE > nul
                            5⤵
                              PID:1408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A76AF~1.EXE > nul
                            4⤵
                              PID:400
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D180B~1.EXE > nul
                            3⤵
                              PID:4588
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3016

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{04AF53CA-6786-4abd-846D-CFF982374426}.exe

                            Filesize

                            180KB

                            MD5

                            87664cbf4b00676fb69fbda05fb1b1a1

                            SHA1

                            e0bce97dab7342d0c79c1a44394231ce34bad704

                            SHA256

                            574ea1a5b5a298a5904629bcaf24ab12f142e6f522757351fc421dda4ca21be1

                            SHA512

                            418b7cb1f525b5ef718181f1d4e2224ea0eabedfefec1a5c4a80b0af10deef6dcb8e9a24c0fac1f74a420ffca34fcda127c49ae52b001e5ef730c39c3b99f289

                          • C:\Windows\{1005C682-B225-4c40-BA41-F13C440E0527}.exe

                            Filesize

                            180KB

                            MD5

                            ed08c5a9390692a3df8e188d9bdee1e2

                            SHA1

                            7ef6c69ca22ee33537244e7d0b44eab430764ec5

                            SHA256

                            92fb25621207affe71fd49592972dac367f7622446c0dc0e129c85168b5f2c44

                            SHA512

                            5acc6bc8836d71ef75ed4593aa92263479f8055ed1737d0261fb8e84ac089b39ffdb759c49559cb59c2c0c489346b0df2733333d2038b80cc04293155cbac8fb

                          • C:\Windows\{219536D2-9EFC-459c-8F88-32749B2B03AD}.exe

                            Filesize

                            180KB

                            MD5

                            f5d10c14a5b0dc01d4a7239865379b0f

                            SHA1

                            c60545e7315e69654e8f5186f2ca89643d496771

                            SHA256

                            a858a26fc7b448e138c01bf2c2a8e782f742a5125fc113f9abf62ec3577731b4

                            SHA512

                            9303fdcefd763198df13ff6cb9b00f371bbf54f7bfc6deaf69fbfab77902ac0f86d669a1204600fe3576bb82840271e388cde06ee7b9b191705b4c69df6d4b47

                          • C:\Windows\{22B7B092-12C7-437a-A641-8B977A743739}.exe

                            Filesize

                            180KB

                            MD5

                            d039190616c8080c68d760326bb10e64

                            SHA1

                            131c8e049dc73dccf50247740edf421145975263

                            SHA256

                            86b0375f0d64e901e47215ada99c718f66790851a01efa23ecd64b4553f7a44d

                            SHA512

                            a2f5615d7ddf8ae413df7ee10442f6374603f92c355cf21291084309f1c6545d7ce0f30a19f383674ddf86dff16ddce05fd2255aee27ad6e5ee618b15b74c02a

                          • C:\Windows\{5D7AB431-5430-49e8-B909-17CBA49F2833}.exe

                            Filesize

                            180KB

                            MD5

                            e9b51be677e74cea6fb6c1e98d17fd4b

                            SHA1

                            6f31940dc10ce32682cd3b9ef4ff544c7926143f

                            SHA256

                            6d79457e910e2a24e94c8dd6b25adfb1b57ab521d8df47b01c4141b0d02a1cbb

                            SHA512

                            0f351737865793dde22d996fc9d60d7990a35ebd0c0990849ae0633823018b77557f9a4adb1cd90f35c4345aaadc819c38e8fad1233adaae8add643d7ef85026

                          • C:\Windows\{7D200EAD-F06D-4c80-ADF2-0533FA18051B}.exe

                            Filesize

                            180KB

                            MD5

                            a51ff04320f16d55db55c1f194391ac5

                            SHA1

                            9881780b3d3538f502a4140c006ca25203466949

                            SHA256

                            c49e49ce1bdf21646dcbf798dd857e392b1668c4cce10238b78afb01d2e20013

                            SHA512

                            608c1c8345c05590b45b09f82adfc4486e21c1cbbd6927724b30b9a08b4ed6e2c00c6501d854cd981a6e5e81e33bc7fec922cbe09ac9216455b846759d700f9f

                          • C:\Windows\{8900956A-4AAE-4a5d-82F0-9AA6D4B37578}.exe

                            Filesize

                            180KB

                            MD5

                            68c577790764312a0582719942d9c950

                            SHA1

                            f48453fb4abdcaaa50ea5a968ca37f7670c4f9f1

                            SHA256

                            566d15e55f5e9c59ff550802d1dfa824ce37d82e67dcb11284e15321c0d94cd2

                            SHA512

                            2699919616c3781388d9b855bc42998959686e03f28b3e6b1981c186fd94a932514d4f1e7173ac05fc8dd9675ed2a066bed1f61700ef23137b92a0e5d6d786df

                          • C:\Windows\{A3EB3067-21F8-4913-891F-8F6FD67E2BDE}.exe

                            Filesize

                            180KB

                            MD5

                            5351a145d007927bfc344efb530d7df9

                            SHA1

                            b4f1cfcbc2e78c9b390ec159743868248c1b8ffe

                            SHA256

                            106cd9b2e18fabee3f075bd1c33ee25f6d6ff454cd056dcb5ca589834dbec720

                            SHA512

                            4b8df3f7de81174f0b2fb990b3b027d2ed51eea37a9505669ab1f45dec0860a50bdae95bf4ec50e6578d4e28adae11b007fd7493e9e5885722e661729fe723ed

                          • C:\Windows\{A76AF912-2AB7-4f73-B9C8-B4F12401D116}.exe

                            Filesize

                            180KB

                            MD5

                            c0d3b426e258ca7c47a1a118689685b6

                            SHA1

                            94644dd3c533b5273d831534d843ce0c74eb87e8

                            SHA256

                            a4dde1bc08debee0f22fc12b6f5d2914c41e7d50d5edba0606d53d4c270257fe

                            SHA512

                            1a61cd5b1255f7bb948be97d0836488d12fedd999ef22854d4eca64fd957c53636fc33e20a2ad2dfea7469e782811aab625c454f2bb5f3e1161a89f29ca35055

                          • C:\Windows\{B98E39C7-0A06-434b-B9F3-D37EE46EB71D}.exe

                            Filesize

                            180KB

                            MD5

                            80a289d2db609021b9f940fe4fc0d20f

                            SHA1

                            9e3ced6ffb92904eb1bc735f1bccbca35afef38f

                            SHA256

                            364b95f9648888dd442d06c1844e7817db71bf31bea729e97426b85e7a86ef90

                            SHA512

                            683bded8f0022aac7a50b677273cc694a1f7e47fd962b274d313236245523ba2a24a6baf2b289fa63ef16d521f5ba96c7cf3cb02a7ae154c51319c494826378e

                          • C:\Windows\{C354BE8A-C1E1-4fa2-AA0C-F504317FDC40}.exe

                            Filesize

                            180KB

                            MD5

                            236b094614b0dcba7f888048224ea566

                            SHA1

                            27781c031bf1b8e0add7a335ac539518c4fa3467

                            SHA256

                            dfeb981857a4277c759170753ed3c730e5299b78b4507949e86f11f49a25317a

                            SHA512

                            cc8599110c3ce69ae960b0626e48a826d19dac439c72d72384bebdd9cd8299c6da96dcbb442f92c862dbfdba71450e84d5a554b4ae7ecd68f4fcdcb1d54cb71b

                          • C:\Windows\{D180B699-3BD9-47a2-8F45-35DF2A0E1D8B}.exe

                            Filesize

                            180KB

                            MD5

                            71127411daaec50d7a70f46c699c23eb

                            SHA1

                            4ec9e53f26af7696106d7c48e898317bb31da5df

                            SHA256

                            a16d016568744f772b0ec621e9356dce3b82fcce992fa45852f1e6d72fe9f11c

                            SHA512

                            516ab97f0118310869e3e768106cf179c25682045f34924eb31d67e14ebd1a187aaeba41c21a5e2cad2ccb6e0815731980e936226304031387f50d3625163ab6