Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 17:24

General

  • Target

    2024-04-08_534e83fa30e56b024711d651fe303b61_goldeneye.exe

  • Size

    408KB

  • MD5

    534e83fa30e56b024711d651fe303b61

  • SHA1

    5bdf4c7a3e01db9ff46d77d178f205c538927adf

  • SHA256

    f1c14f366ea2d1acfd329c249f2ff78e407421ba9a6db2d729d969f8122df589

  • SHA512

    b90a315c9e3548af4c32afe04a4ab9d9e2666d5bbe50b4900922e0a30bc2ce61eae22ff3650c2cd2d3b165ed351a05c91095393b6da35a649c3a6fd524a5c012

  • SSDEEP

    3072:CEGh0otl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGfldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_534e83fa30e56b024711d651fe303b61_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_534e83fa30e56b024711d651fe303b61_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\{99B5B094-E167-4fe6-A82E-DDD5CDB6C1CC}.exe
      C:\Windows\{99B5B094-E167-4fe6-A82E-DDD5CDB6C1CC}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\{4C175782-D5EB-4336-949D-C8534074CCBD}.exe
        C:\Windows\{4C175782-D5EB-4336-949D-C8534074CCBD}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Windows\{E7228C08-4831-4411-A5AC-2DDBA0E0D1ED}.exe
          C:\Windows\{E7228C08-4831-4411-A5AC-2DDBA0E0D1ED}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2568
          • C:\Windows\{44F0C9BB-C153-4e6c-9F1E-A5F792B85DD8}.exe
            C:\Windows\{44F0C9BB-C153-4e6c-9F1E-A5F792B85DD8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:676
            • C:\Windows\{036DBADB-094D-4d88-985B-107B46A14E8D}.exe
              C:\Windows\{036DBADB-094D-4d88-985B-107B46A14E8D}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1340
              • C:\Windows\{6CBA8E9A-B2AB-4472-8A93-D0A451F5D378}.exe
                C:\Windows\{6CBA8E9A-B2AB-4472-8A93-D0A451F5D378}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2428
                • C:\Windows\{21CDF3BE-75CC-4a6f-B5DA-8F6B1B75C361}.exe
                  C:\Windows\{21CDF3BE-75CC-4a6f-B5DA-8F6B1B75C361}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4436
                  • C:\Windows\{4D9853B3-F72C-4da6-8E93-B9E3DCA811D2}.exe
                    C:\Windows\{4D9853B3-F72C-4da6-8E93-B9E3DCA811D2}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    PID:1092
                    • C:\Windows\{2DA84AF8-BC56-4824-AFF1-B016A9097CCE}.exe
                      C:\Windows\{2DA84AF8-BC56-4824-AFF1-B016A9097CCE}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3180
                      • C:\Windows\{ED79BD76-DE39-46c1-94B2-0A375F3CE946}.exe
                        C:\Windows\{ED79BD76-DE39-46c1-94B2-0A375F3CE946}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4028
                        • C:\Windows\{F789E3E5-FD24-48e1-8E80-F88D6AED9696}.exe
                          C:\Windows\{F789E3E5-FD24-48e1-8E80-F88D6AED9696}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:464
                          • C:\Windows\{05339A79-E471-4a91-8AEE-8D5DA2338602}.exe
                            C:\Windows\{05339A79-E471-4a91-8AEE-8D5DA2338602}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:2400
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F789E~1.EXE > nul
                            13⤵
                              PID:3588
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{ED79B~1.EXE > nul
                            12⤵
                              PID:4668
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2DA84~1.EXE > nul
                            11⤵
                              PID:4452
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4D985~1.EXE > nul
                            10⤵
                              PID:1196
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{21CDF~1.EXE > nul
                            9⤵
                              PID:4312
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6CBA8~1.EXE > nul
                            8⤵
                              PID:1976
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{036DB~1.EXE > nul
                            7⤵
                              PID:3032
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{44F0C~1.EXE > nul
                            6⤵
                              PID:1524
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E7228~1.EXE > nul
                            5⤵
                              PID:3744
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4C175~1.EXE > nul
                            4⤵
                              PID:1944
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{99B5B~1.EXE > nul
                            3⤵
                              PID:2980
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4916

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{036DBADB-094D-4d88-985B-107B46A14E8D}.exe

                            Filesize

                            408KB

                            MD5

                            cd9db429cecb224729685a8d5f078767

                            SHA1

                            f6b413573ee54e420ac60f6fd039dc4481367519

                            SHA256

                            74183204ac65b1674aec0cd18fcc3c69a1743c3a646b6654f05c719bd31a0f9c

                            SHA512

                            630ff69e78f7380e3b9f074e8dbc8091e943e9b527d2c8a07f2d1001d28a69fbe460f7e4313f84af749a2a6ddfff6ce7572905ec20c6841aac41afdc12ea97a8

                          • C:\Windows\{05339A79-E471-4a91-8AEE-8D5DA2338602}.exe

                            Filesize

                            408KB

                            MD5

                            717f8bb39854d720891d5713c81d08e3

                            SHA1

                            f2ca95a9e341cbfb961376ad8dfd9b67039977cf

                            SHA256

                            f7b2f8da5996365500a08cc82b13081e6c0190c1ccb1f2ea79e502588ea8a271

                            SHA512

                            25ce5905ebf210b721dec471c7bf5764b220f9f9098aab4330a157324a7ec512b9e86647a4ad2c00e4ee64a1fbaf3312e1fa288126e412e3a980262dc3b59bed

                          • C:\Windows\{21CDF3BE-75CC-4a6f-B5DA-8F6B1B75C361}.exe

                            Filesize

                            408KB

                            MD5

                            db2ca69f88a9696a41ae8f9c10c04322

                            SHA1

                            a1c6259ebe40d9013a04214d80904c8690a23648

                            SHA256

                            36ac9adbf144308ba72dd4cfb827a39322117b1c4bc83f068dd56b23e1353230

                            SHA512

                            91cd726262d9a7dab2294760547408384092533e068bb43d537573027f5b787e95f22fb9748b107e3f66784d9a4111808da78cc7e23dd30bd80b09e3bc2a94a4

                          • C:\Windows\{44F0C9BB-C153-4e6c-9F1E-A5F792B85DD8}.exe

                            Filesize

                            408KB

                            MD5

                            a2bf169b83369b6adcf897513e24f385

                            SHA1

                            650382b2387a353f07af9d62caaf6940ee6149a5

                            SHA256

                            7fe8ed4a5defc7924ca5400fb7f22c31be5dab2521cf1fc33893d74152135921

                            SHA512

                            74a2c8843d9c3b9b6ec50f66f5fa6c04d9206ba98cb5c08f6cd442c8c6725d6c366bc706fd46cac20ffa5574b33741b380f868c852374d293afe11d918860b01

                          • C:\Windows\{4C175782-D5EB-4336-949D-C8534074CCBD}.exe

                            Filesize

                            408KB

                            MD5

                            d348ba7ac5bef09e925ea85f57b275ac

                            SHA1

                            e11d3aa265fa0f5b81b31e913f47b5a746f96143

                            SHA256

                            0f8e400d0aab0d3acc962ccdbe6422d0f219ffa815e6f87b1da66033c3bf6793

                            SHA512

                            cde4e7d0a2373874753104d1e9643d9433c5e12000117b0df1429dfb919eebfc7d5f7757ccbcb8ca057a9bfe55324b457ba217ef708423134a6f4b011467478b

                          • C:\Windows\{4D9853B3-F72C-4da6-8E93-B9E3DCA811D2}.exe

                            Filesize

                            408KB

                            MD5

                            47bbc54558ccd9c3a6d1db4b4a87b083

                            SHA1

                            87fb88dfad284e0edc8024668f06607699665254

                            SHA256

                            7e229723f06fde4549d76a3d1c3e6e5e118edbfcff0bc681d5462eb829c8162a

                            SHA512

                            a0058677a01ffd86cf1f3ad051473bf28b6e7ca2070b62c863f649f63394e0ea867f23d478de0dfd7ead22aecac0fe62ce5d8f1c1ce9c2d157a63695b91a505d

                          • C:\Windows\{6CBA8E9A-B2AB-4472-8A93-D0A451F5D378}.exe

                            Filesize

                            408KB

                            MD5

                            ae6d97055a4ac4b176aa6942ca35bd30

                            SHA1

                            77f13cf70a0645aed8384400a9e21c8bc135926b

                            SHA256

                            cc6750a52e02ad4aea77cd5bde29d3aafbd58ce802efb1a9e42feaea8c63b40a

                            SHA512

                            f2a514d811fbe47c6b15537bbc9ea94dde88237dd37a86049f232486d8e146e38e38d95c17202113465e7e669c54ff54d244d9d3d22cfa65b6e9972959e3d819

                          • C:\Windows\{99B5B094-E167-4fe6-A82E-DDD5CDB6C1CC}.exe

                            Filesize

                            408KB

                            MD5

                            b5bf2fdf41dfb152811cecf83168464f

                            SHA1

                            3f2decde45e6d5819854017a000a597a827a4668

                            SHA256

                            49bae4afa74d8c4a3249503329112e526f4640f5c5b2766d30bb3e22c55ab4cb

                            SHA512

                            c15ced897a7827e82c8666512a7830589a03c9dd966e2254794b3e604501feefec2de87824cc63a85bef6e63d7ac8a39677ae8628be21188feb4686802e99fd9

                          • C:\Windows\{E7228C08-4831-4411-A5AC-2DDBA0E0D1ED}.exe

                            Filesize

                            408KB

                            MD5

                            e41c2e860307c9f77c1c54780ceda11c

                            SHA1

                            1752b1cbef058520a6dc3ba26fac1d44e723859d

                            SHA256

                            a0984912e05a7fd2e756858b581f8f942be4487e3adc551ef8d996e9a9677065

                            SHA512

                            5af0c30d301653df449fa8cedfd890a8bd2117e3e279e5238520c72c6d80aaef896e6a1af5851d2fff88c505bdabfefdbf93b0fb478a4d4a25f24e12041546fc

                          • C:\Windows\{ED79BD76-DE39-46c1-94B2-0A375F3CE946}.exe

                            Filesize

                            408KB

                            MD5

                            9499afc11a3456a41c8091c8c74407c3

                            SHA1

                            47aeac339ed7b6c368a4ebea4ff17ac3438bc1b6

                            SHA256

                            c4d310f13e3f24df838e62798d56087db406f5c76061ec6df1d95443eb3926a8

                            SHA512

                            7ccabe1340777f2917e5dd8a9bb004f607e160c68de5f4d91e82a28f9c8ea68ceba097192008a43777f732005c3f2a3d48ad0ef70a4ccc81a92fa494ffb9a8d7

                          • C:\Windows\{F789E3E5-FD24-48e1-8E80-F88D6AED9696}.exe

                            Filesize

                            408KB

                            MD5

                            34881b72e31275a3f48d9641a16613d5

                            SHA1

                            ecca9cbcca8aa9978b90d24848e7c6cc8af137ea

                            SHA256

                            c3cf43add479ee3df7c164839f324320b61794c97ed5fa23f54d88bc14ad1705

                            SHA512

                            194d2c2edf7581733857139f19fd3ac7b8e9cf6fa4b6ced813e8cb10903716b7152ce71f22ad0d1337fa7d8c9bd2fe2620e84d16df008a00f73befa2a4cd54c0

                          • memory/1092-31-0x0000000003930000-0x0000000003A0B000-memory.dmp

                            Filesize

                            876KB