Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 15:58

General

  • Target

    2024-04-08_281209c1f670a58bc1b94bc28ab5ef6a_goldeneye.exe

  • Size

    204KB

  • MD5

    281209c1f670a58bc1b94bc28ab5ef6a

  • SHA1

    103005a58dba318a1e026d642ede562ad03adf2d

  • SHA256

    cd2ea7af3c723c3a0db234e9186b461d7b9aeaf836d42e996aca61bc9e94219a

  • SHA512

    108f9ccb1934d65a9eff6dbfa9a2d7a2b9a19b908063ec30c79339250553a8283e7c17f0c694ec7ed6765d555fe327e95bdf6f918abbc77f128c52d2bbe1bceb

  • SSDEEP

    1536:1EGh0oAl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oAl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_281209c1f670a58bc1b94bc28ab5ef6a_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_281209c1f670a58bc1b94bc28ab5ef6a_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\{7A40C291-7AC2-45fc-9DDE-1AECFB3FD66D}.exe
      C:\Windows\{7A40C291-7AC2-45fc-9DDE-1AECFB3FD66D}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\{FD7D5A2A-4056-4d6f-B4F2-6BD44EED667C}.exe
        C:\Windows\{FD7D5A2A-4056-4d6f-B4F2-6BD44EED667C}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\{AA05CBD8-ACFF-48cb-9FF8-8C30586FFCA5}.exe
          C:\Windows\{AA05CBD8-ACFF-48cb-9FF8-8C30586FFCA5}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\{4C382F88-CECA-4c8b-AF26-C7A45C54F68D}.exe
            C:\Windows\{4C382F88-CECA-4c8b-AF26-C7A45C54F68D}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Windows\{1482E189-C238-4cb2-89C7-973FAD86DBB0}.exe
              C:\Windows\{1482E189-C238-4cb2-89C7-973FAD86DBB0}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Windows\{EEAB5A43-BC2C-47dc-8676-DC74A0A9F221}.exe
                C:\Windows\{EEAB5A43-BC2C-47dc-8676-DC74A0A9F221}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1528
                • C:\Windows\{678E5400-3F5E-4d0e-A7D0-02E37B250AC3}.exe
                  C:\Windows\{678E5400-3F5E-4d0e-A7D0-02E37B250AC3}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1784
                  • C:\Windows\{F53E0AC3-9721-45a7-96CE-FC282DA725C8}.exe
                    C:\Windows\{F53E0AC3-9721-45a7-96CE-FC282DA725C8}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2816
                    • C:\Windows\{B775EB5D-BF50-4736-A9B1-042AEF041F7F}.exe
                      C:\Windows\{B775EB5D-BF50-4736-A9B1-042AEF041F7F}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1140
                      • C:\Windows\{92D4DAF6-B6A8-4219-BC7F-81EDABDA396B}.exe
                        C:\Windows\{92D4DAF6-B6A8-4219-BC7F-81EDABDA396B}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2104
                        • C:\Windows\{4D2EA662-6628-4d0d-A372-9F6C594C8B5F}.exe
                          C:\Windows\{4D2EA662-6628-4d0d-A372-9F6C594C8B5F}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{92D4D~1.EXE > nul
                          12⤵
                            PID:1128
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B775E~1.EXE > nul
                          11⤵
                            PID:2292
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F53E0~1.EXE > nul
                          10⤵
                            PID:2520
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{678E5~1.EXE > nul
                          9⤵
                            PID:2692
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EEAB5~1.EXE > nul
                          8⤵
                            PID:592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1482E~1.EXE > nul
                          7⤵
                            PID:2624
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4C382~1.EXE > nul
                          6⤵
                            PID:2524
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AA05C~1.EXE > nul
                          5⤵
                            PID:2288
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FD7D5~1.EXE > nul
                          4⤵
                            PID:2780
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7A40C~1.EXE > nul
                          3⤵
                            PID:2772
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1716

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{1482E189-C238-4cb2-89C7-973FAD86DBB0}.exe

                              Filesize

                              204KB

                              MD5

                              56772cc9756817b2ab3dc8e79d2be1b8

                              SHA1

                              c6b786c201460a2d4226f67869a1a1406da15dae

                              SHA256

                              371cb5c8f96ef5a311c7bbc2de5f4148255f9814af2fd0e9a11698e4c1cfbc2a

                              SHA512

                              4fd3c73f9fcad1cfc767e975d8d22fba384a6d073de8dfa90c8e15b336382be86a1bbeb26c7f5dc676d6ac2e7dbdb2021c80706f7503fb94981cf594517f0b6b

                            • C:\Windows\{4C382F88-CECA-4c8b-AF26-C7A45C54F68D}.exe

                              Filesize

                              204KB

                              MD5

                              7b0edf3bee95df7d402cd29c9920a985

                              SHA1

                              9461482416b07a69b6fb8782b9c5ed10c5f8af79

                              SHA256

                              431124da0e34c8ebdd477bf4209212b61a4020598c2877725643e5eacbcc00b0

                              SHA512

                              19fb58de084b9cd083f23c8fc04a1a781b3b74df47d0dcb51d8fc2df00be71996e4dd034b6277cb1bc8ae52b9adece1676cf103023345ee0f71133ccfe7cf4b0

                            • C:\Windows\{4D2EA662-6628-4d0d-A372-9F6C594C8B5F}.exe

                              Filesize

                              204KB

                              MD5

                              1f20469c9b727ac78b37444b3fcc41cb

                              SHA1

                              1cc3ad173fc0966b26115ac03b9cd79ca215e4a9

                              SHA256

                              27ce3f1ea19597103f1f8020308c3b5f8a71233c4798dbd623ac564d0000b76d

                              SHA512

                              97508ff4c56affa436e12f0fe1fed2db9aac243fd06b376f6675c2b538b7411e4aa9b3ff3a64aacc2fc87f8ea469e8cbe435e9949f13f1c700272a012877eac7

                            • C:\Windows\{678E5400-3F5E-4d0e-A7D0-02E37B250AC3}.exe

                              Filesize

                              204KB

                              MD5

                              201f5e5d2f1a0599e87f71c8abe84c24

                              SHA1

                              7a33a681ee301d29304d29497b0eca9d6568cd67

                              SHA256

                              bbc5de7da7412d1d97badb83a5ad0339571e77d668e451dec64325c4ad5a5fde

                              SHA512

                              0e57ec71b6db859a4fed0f7fc08321e667a5556b780166c83afd8fb079dd3240b4d6913fc628f9f7ffdbfb9e11112f06fd519c8d526241f04f6ecfe671fb6c15

                            • C:\Windows\{7A40C291-7AC2-45fc-9DDE-1AECFB3FD66D}.exe

                              Filesize

                              204KB

                              MD5

                              af0f90ba703edd342f5bdcf514365954

                              SHA1

                              c16ca937df3c234564022eea8407b80cc91c5efd

                              SHA256

                              27b97a62ce6eba6bab9197bbbc46ac08832b4eb63e32468955e8b473151dba6b

                              SHA512

                              42288c884fe2fc9fea6fdb77a8567b52bbd65be5f3fe4d8c97fe54d36be4c1d73fab16095ad6adeaf185b2d4326832742fa39c5fc802211cddd8b4d24c98164c

                            • C:\Windows\{92D4DAF6-B6A8-4219-BC7F-81EDABDA396B}.exe

                              Filesize

                              204KB

                              MD5

                              5a46cb314a8039afb07ee7e61b9756c4

                              SHA1

                              2132169ce95e4d405e8c8f80ff1b9c7dea0c50bb

                              SHA256

                              ca34181091791cc8415ab752bfa305fb61c4596b76dbf03f2130e378a6af5fe4

                              SHA512

                              82312de153139be39cf1d6db91a622e0694dc930f8988455a22a5463f1e38c8b72eda52d5ccb90f1420ea6ec1d0b2fb4dc89585abcea63731265ef1ba8d4cc6c

                            • C:\Windows\{AA05CBD8-ACFF-48cb-9FF8-8C30586FFCA5}.exe

                              Filesize

                              204KB

                              MD5

                              021905a64618d474474853c3c6022983

                              SHA1

                              728a524ad9e2deb379edfb275790445de7176510

                              SHA256

                              3d2f205901d969761a82194dc3689c4ba828a8b44e23eeee8be84cb172f24702

                              SHA512

                              f1c8010546ddaa9f9d4a0848d542e6917809ccb15ee3237512cc2e92115ecd6d293e140adc7d9271c152e3886d67788e752954acbe843d7cc8b60a6bf161f077

                            • C:\Windows\{B775EB5D-BF50-4736-A9B1-042AEF041F7F}.exe

                              Filesize

                              204KB

                              MD5

                              2a6a7beaffcf4fe4cb01a0d6a1f54853

                              SHA1

                              a9e26fa0127d9f326afdcd82556aba0e05294762

                              SHA256

                              c820246e72f56d34d3284a4286ab24281a336d2766a5afb6c7e75f5b54942e3a

                              SHA512

                              92c4bf9817ef9506138e46bb74ae951da164d8dc720de6c8d1b2c01c4d04cbdbaddd3ff11a867444f5ca0f0899bba8d0349114407ef9f457d57214fb5d609d1c

                            • C:\Windows\{EEAB5A43-BC2C-47dc-8676-DC74A0A9F221}.exe

                              Filesize

                              204KB

                              MD5

                              7a45460da139038be163e54be159937b

                              SHA1

                              fc4836214284f6b673db452b2bdcc17e97e9c609

                              SHA256

                              ffefb491fad28c724d0ce0d7605987098ad74c68189ffc0fec350467d68bbc79

                              SHA512

                              a9d1e898f2e1919465767f59ce1dd0ae653275cd6d655ca03b66c8cc39a09228eba3964ac932aa796d365efb59f932904a0c5066d951bb7d0adb299373062db9

                            • C:\Windows\{F53E0AC3-9721-45a7-96CE-FC282DA725C8}.exe

                              Filesize

                              204KB

                              MD5

                              be18080686448ab44b31e53fc359b29e

                              SHA1

                              3ddc4dc515da66e5a55f392ea4f49da46e67f6f7

                              SHA256

                              510280f7004edc01c58f8d1d92614abc75f8ac0ebececb113dd9f915b80df264

                              SHA512

                              6601cff519d87e7999730e837bc97545505753295cb11442733896509ec3de205565adf5af7dd5b8e657957837032a88f15530d62706d1cd9e57ac36145acd8e

                            • C:\Windows\{FD7D5A2A-4056-4d6f-B4F2-6BD44EED667C}.exe

                              Filesize

                              204KB

                              MD5

                              f2d59337325a4b27c5cd9101d0414de2

                              SHA1

                              b8f38f3f1d3697b33b38f7a1a3b967d3125be546

                              SHA256

                              40d03aa29dab78db714bf60080758da52f22522631a5e4fad4a116521d149933

                              SHA512

                              e4deb3c35ffaa92c9e8277ddbe022442a1c59c6aac24fcd4e3263ce9810d4ebc4f47690cd6627a16ac1ae3585887a7b2cf0c600187fbbb31384d45cb9e9d82af