Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 11:04

General

  • Target

    2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe

  • Size

    216KB

  • MD5

    ef20021104bce40f4af90b7ad71c7acc

  • SHA1

    ce57187802b1014b27d0bf7897813df9878ccc40

  • SHA256

    d7b17ac30b6a7df504bf23fbb82d3d536cd48fb079605bfd9ae5ae85fc637fd9

  • SHA512

    6bb6da31b42c3e6e72c9267fbdcd2eff9f55aa0c581d3cc6e996b90830ff979edc900e2c5568dca00604730d60aca9b19397be59d10eca1801287b90314b00e0

  • SSDEEP

    3072:jEGh0o4l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGylEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-06_ef20021104bce40f4af90b7ad71c7acc_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe
      C:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe
        C:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe
          C:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe
            C:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2060
            • C:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe
              C:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4940
              • C:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe
                C:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4320
                • C:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe
                  C:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3216
                  • C:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe
                    C:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4380
                    • C:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe
                      C:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3012
                      • C:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe
                        C:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3140
                        • C:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe
                          C:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4452
                          • C:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe
                            C:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4664
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4FFCF~1.EXE > nul
                            13⤵
                              PID:456
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{55523~1.EXE > nul
                            12⤵
                              PID:3764
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D5277~1.EXE > nul
                            11⤵
                              PID:992
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5A7C4~1.EXE > nul
                            10⤵
                              PID:1068
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8E812~1.EXE > nul
                            9⤵
                              PID:4384
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A0EFA~1.EXE > nul
                            8⤵
                              PID:3524
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C8784~1.EXE > nul
                            7⤵
                              PID:4732
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{66963~1.EXE > nul
                            6⤵
                              PID:2272
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2F543~1.EXE > nul
                            5⤵
                              PID:2204
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5E436~1.EXE > nul
                            4⤵
                              PID:1380
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E1F64~1.EXE > nul
                            3⤵
                              PID:4008
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4164

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{2F543225-7F6F-4e12-A2CE-07233808DD3E}.exe

                            Filesize

                            216KB

                            MD5

                            f019fa12e39d23d8167087020d2f1e2a

                            SHA1

                            453d3ea7dfd0e8605e22a26035b983b83f2c528c

                            SHA256

                            cde24de2d3d74cc7f11da5296e706fc861158545eaac8de0644ad9463d4b7e54

                            SHA512

                            7e7d57a5c9f171728245688c00cfd5cf9b74c41ddfcd13a8a1b397c57f940782370fe0dedc8f15e6f64a3a872881a620b10f6703267d616032150503c85e419c

                          • C:\Windows\{4FFCF568-5E33-4069-91DC-5ABA91F0F341}.exe

                            Filesize

                            216KB

                            MD5

                            d87278ac25d26b954d460a849e8b2c32

                            SHA1

                            f9143f523f32ef8b7ffe61084265134b086d0ad0

                            SHA256

                            49a43d29cb277e12ab82e51af507e604f80c0c063ca828f635be23b183123261

                            SHA512

                            d314b99a0032c29e46f8d9618d86e51309cbc6c457e62cc07f6dd589d4709a982ae1bb360c638482ddca8409935c38dd2dbd882f1131201a5dfd4c400cb8817c

                          • C:\Windows\{55523BD2-31B8-45b2-990C-3F510DCEC6F2}.exe

                            Filesize

                            216KB

                            MD5

                            534e979881e3c7e28412484c54e1f6b1

                            SHA1

                            f5ab27eb3ded1b139a20482c7ae41ae74e134936

                            SHA256

                            39b07f4b1375221dc7913fdeae9e74eb3fdb34d69ba79f850c63edf155c8f2ce

                            SHA512

                            6931729cc1c95aabb7b343459a78c8ae75099aeb13e39cd97d5fcc56d70c08c7caaa3173608ce27e18be3252364c787489d12c375f4aef20d0fef3369db7a22f

                          • C:\Windows\{5A7C43C1-DCAB-486e-9132-9BCA79A376D8}.exe

                            Filesize

                            216KB

                            MD5

                            f116d950ba32ce4e2d80b85850a6efcb

                            SHA1

                            eebb01ace99b297bd2f48f2f6412207e9d7dbf0c

                            SHA256

                            1382fc2f480f506c4a3b359b795e0a725d337b1698615dfea02aa08e9d308847

                            SHA512

                            6fb0e1e2b3c33c4d4ff43f9f94b5c2b09f7499527a2a07882d1afa567360e632f2886913458cbe6802bf4faa7692b5594280437336edcfc1c0141145de24bd36

                          • C:\Windows\{5E436C88-BE69-4df6-8C3E-4C144F2C1742}.exe

                            Filesize

                            216KB

                            MD5

                            624180881ae85e845e4f713510c536cb

                            SHA1

                            1c857eb1cc63d218bd437118db264374f5b96bdf

                            SHA256

                            a65068bac1daf907e7f48db367748158a13506bc7a7171ee048628ab41c6f78a

                            SHA512

                            fbde48c831ab16a551835b4ecf2807c868a641d588e5cd34a39e2e2332590994c8029c22bf329a290ce5c856151cd7a2a8c96bbf7ef5da982ef56732b0f04896

                          • C:\Windows\{66963EC5-9064-44f1-9D18-E332B4FF9AAA}.exe

                            Filesize

                            216KB

                            MD5

                            50f20144ab2fe40fe5b80c5ddca1e509

                            SHA1

                            e3ebf100c5a38b5803ce6a856cacfc9670acb536

                            SHA256

                            3308673b741ddc7d040a353caa6f6a7c96954ebb15efdf634dc00156b21801ab

                            SHA512

                            049270a98822d392bb295c123dc42f0f65f53b1a40c1e3e901d4900e1d4a47ca5410f98c694a4bd8c7be2eeed12dec848e9dec1758d53119ae1809d6615ece4f

                          • C:\Windows\{8E81224E-239F-403e-B7CD-0662F1CFE85A}.exe

                            Filesize

                            216KB

                            MD5

                            ba0c35e2ba668f21569b48fb066f2595

                            SHA1

                            0b3337e6533abab10dab1b7652e3db6afe07b31b

                            SHA256

                            b8b08449665804b4f5e5ca34b508e2d1fbb4ed1ab17fcb355ca5869d5b0b4b1c

                            SHA512

                            c1cca0e796b224587520bdde2753708df0e5b2e089eed8e5ae31fbce070ac1ad18ebe239a592bbf645658a6b867a575fb8829552db9ab7ceb659b38a95b5339d

                          • C:\Windows\{9B8CBE83-B169-470f-9E9B-69A00F902B8E}.exe

                            Filesize

                            216KB

                            MD5

                            7b2f7f72f0b12b21bf6e9894c9110dcb

                            SHA1

                            f505a8298f1aa24ed2f3bf0654cb949a1ae835a4

                            SHA256

                            4a53c7e1eb8e7cdf06e8b1c35cc58fcb47eab4db0758de5b47a3937f9fadf11b

                            SHA512

                            ec28fcee959d76f39ed65b9032849a1ddd9bb0cde599e64e24a54bcd0cf7075ef08a9531a884ca4e3ee84440894c499e0f11ba0d36bd84e80606b3e980dae074

                          • C:\Windows\{A0EFA2C6-BA64-4fbb-B518-82451D8FB58B}.exe

                            Filesize

                            216KB

                            MD5

                            9e7c5335695d2a124673680f5f8247a0

                            SHA1

                            88689b76d857910a98660ccc77b2fcde8ac206bb

                            SHA256

                            f4307344ad907a4a1c4df2c578f16ce611f65dba2c7640b822811b50dffde73a

                            SHA512

                            48db1d6f2127f7769cb8af519bbb75f0349c63df1b94cc6b7b60688743c73f4ffd1bc4cdd4b8c69cb71098fbc68997abf61a202278af99293f1d06117b6a363a

                          • C:\Windows\{C8784BEF-141E-4b03-85C2-0191C46E0EE7}.exe

                            Filesize

                            216KB

                            MD5

                            5b6f2cacd3a9269a32337bf8885b2445

                            SHA1

                            f96d3d7f9c76179d81ed9f92d1c3142ece8ca9ba

                            SHA256

                            19a16333e321a3d2b1865b939fc0f330179e630da9fd0310a5adac488efb1a9b

                            SHA512

                            ff5c7c01db9ac5784b32456278245f38c2c2e302b05cf54b88c27e029c6183dee43aab18acde9a4e3a1453968e22aea326e6c59e987e1ae079968432b6c1497a

                          • C:\Windows\{D5277127-EEFE-4e04-862F-DD4A17984162}.exe

                            Filesize

                            216KB

                            MD5

                            e78955368e5abd7ea1b865e39cb1abbe

                            SHA1

                            a594f41f983d21ef223ea427e51a1f9eadaaf320

                            SHA256

                            ab2da7f252f0ef32624a55a7189ef43b420b24951929d851f621ef8a2a2e91de

                            SHA512

                            167a39d4e7c170557d7fa1a2d96c4ca5f50e3b1b7533f002b1b91c72861d6af026bf44f82659e4f9021510aa380799320e27622d9ef4312c1b6021a3915eebdb

                          • C:\Windows\{E1F64648-FDFF-46b5-8827-14E1F663AB5D}.exe

                            Filesize

                            216KB

                            MD5

                            f1c9d57e81d47b751514aa73f9b940a4

                            SHA1

                            ae6cc1743f77ea56113de85053a754c608fce28a

                            SHA256

                            8120fde94aa374e1bf12c35304252bdd5ce966fd04a1cee0c6b7838ef3e4eba1

                            SHA512

                            a9706962d6ba778ef7fb283a499af481d8150301352ed20a8046cf5d159147b2dd2017d7680064fe29a9e3d0bbdb90d33dd14bbfe9ea531138c7b55e17026553