Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 18:55 UTC

General

  • Target

    2024-04-09_6415d46b5168733c37d1f3f8b41a05c4_goldeneye.exe

  • Size

    192KB

  • MD5

    6415d46b5168733c37d1f3f8b41a05c4

  • SHA1

    1492d02cb85eaa2914b9f325cf83fd0ce09b7c54

  • SHA256

    7f96c894639093f6323f208d81cb422f65ff5c776990ba6f30949f5a27bd01a0

  • SHA512

    1c6db00c286447a4fe9875ef7d1f2e7267b5fcf7b650d9145fcf14aacf4eeaf36e4c2e81959b97832ef3a988db3c03576edc7fd6967dec6079517f13d8164eb6

  • SSDEEP

    1536:1EGh0oil15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oil1OPOe2MUVg3Ve+rXfMUa

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-09_6415d46b5168733c37d1f3f8b41a05c4_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-09_6415d46b5168733c37d1f3f8b41a05c4_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Windows\{7DD3E8CA-75E5-4c87-B6CC-89DE8BF79BE3}.exe
      C:\Windows\{7DD3E8CA-75E5-4c87-B6CC-89DE8BF79BE3}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\{EACBA903-3873-41db-A968-C419B278DE6F}.exe
        C:\Windows\{EACBA903-3873-41db-A968-C419B278DE6F}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\{A8F17F9A-CF33-43ad-90DD-EE3E94E4852D}.exe
          C:\Windows\{A8F17F9A-CF33-43ad-90DD-EE3E94E4852D}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\{51848F6E-9239-4653-BDC6-E425D9A9ACFD}.exe
            C:\Windows\{51848F6E-9239-4653-BDC6-E425D9A9ACFD}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\{DF5F5DDB-9A01-46ab-A18A-9362F58C05D2}.exe
              C:\Windows\{DF5F5DDB-9A01-46ab-A18A-9362F58C05D2}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2708
              • C:\Windows\{B6B3D0E6-EB9A-47ae-B173-AF094D27A429}.exe
                C:\Windows\{B6B3D0E6-EB9A-47ae-B173-AF094D27A429}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\{4E75C0B9-4EDD-4baa-9483-BD93C44A95AF}.exe
                  C:\Windows\{4E75C0B9-4EDD-4baa-9483-BD93C44A95AF}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1208
                  • C:\Windows\{EFA60342-6B07-493d-BF46-0ECC15BEB1A8}.exe
                    C:\Windows\{EFA60342-6B07-493d-BF46-0ECC15BEB1A8}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2632
                    • C:\Windows\{B9D3EB19-AB49-426a-AA36-C44AAFB464CC}.exe
                      C:\Windows\{B9D3EB19-AB49-426a-AA36-C44AAFB464CC}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1304
                      • C:\Windows\{541A2E9D-D343-449f-AE1C-DFCA591175EC}.exe
                        C:\Windows\{541A2E9D-D343-449f-AE1C-DFCA591175EC}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2000
                        • C:\Windows\{0C72EF45-5112-42dd-A757-E4B6A60C1FBB}.exe
                          C:\Windows\{0C72EF45-5112-42dd-A757-E4B6A60C1FBB}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2020
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{541A2~1.EXE > nul
                          12⤵
                            PID:296
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B9D3E~1.EXE > nul
                          11⤵
                            PID:1968
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EFA60~1.EXE > nul
                          10⤵
                            PID:1204
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4E75C~1.EXE > nul
                          9⤵
                            PID:2612
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B6B3D~1.EXE > nul
                          8⤵
                            PID:1640
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DF5F5~1.EXE > nul
                          7⤵
                            PID:2464
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{51848~1.EXE > nul
                          6⤵
                            PID:2752
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A8F17~1.EXE > nul
                          5⤵
                            PID:3008
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EACBA~1.EXE > nul
                          4⤵
                            PID:2704
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7DD3E~1.EXE > nul
                          3⤵
                            PID:2696
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:2476

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{0C72EF45-5112-42dd-A757-E4B6A60C1FBB}.exe

                          Filesize

                          192KB

                          MD5

                          f2f3b7a2e9f0045c249a3f8b8e399047

                          SHA1

                          a53519d78d95ce2bae980d0bfd228ea6b9694c1d

                          SHA256

                          d68ffe60237ec14422cc3f2cb7848af958684e4054968201fa86455944a37aef

                          SHA512

                          afef30cb11fc2d93b657d01dd1d27f1a568c0f128c0a264c55bdcc5a1ad36343d83c0993b0f4dc009bf22b29de1a85da8d179dead2bc0332c61d671f28e87994

                        • C:\Windows\{4E75C0B9-4EDD-4baa-9483-BD93C44A95AF}.exe

                          Filesize

                          192KB

                          MD5

                          b1488d5af16fa919e86d692f4f26db22

                          SHA1

                          358e366a22d4454b1ae96b072f70b93fcb7a262b

                          SHA256

                          4cbb687469c46b6c5e50af97a201ca86373dcb6a99d32f01f725fac52fb7b08b

                          SHA512

                          c85eaa295d01c45b06f9692e9462c4bd20744d3102949cb371b8285b94820652ee3a17f280fbec40681352fd4916647ff3fb5417e1074538c5aa946bdbb6f7fe

                        • C:\Windows\{51848F6E-9239-4653-BDC6-E425D9A9ACFD}.exe

                          Filesize

                          192KB

                          MD5

                          801e4d879b57031d25d80d460d4218ce

                          SHA1

                          8636c3256707425b7175e2f7d4cf45d44dc78a7d

                          SHA256

                          e1326b3987d3826c8842203d26ce61d4f3cb516a5d8451b4aece9e9484da320c

                          SHA512

                          0a17325b29eafa6c63a868e32b0eb014a9b3d08409b985cd6334ea7c6db8e5828c6f1cbeb9bc4cd31d8edce1ea7e9e0d3ec00c446384a3c4eb6124ab1c935e4a

                        • C:\Windows\{541A2E9D-D343-449f-AE1C-DFCA591175EC}.exe

                          Filesize

                          192KB

                          MD5

                          2a17dff6aad1a26de871e09a2a46d74f

                          SHA1

                          410433da3488413c2fe8763a89d2c51d1bfd8242

                          SHA256

                          94c5d47de694599ecfb16325dafa96ecd19e4b1acbba1349a3e6e7649990e568

                          SHA512

                          922739408dc81159111447ac0913f09e6e6e932d6a11d304d8b2f956c2b4dc6a6035fafef21489449bcc5cd256308e3bc6cf75b63f85870bf03838b1c88501cf

                        • C:\Windows\{7DD3E8CA-75E5-4c87-B6CC-89DE8BF79BE3}.exe

                          Filesize

                          192KB

                          MD5

                          2e4b2b49f3024a3b5cd6b1d9adfa5a04

                          SHA1

                          ffb12e4bd7307ede037ebbff0358cb56451ab7a0

                          SHA256

                          099fa74ca763e3a4ddd11fb0d47c3fcf938e01e8556b214c3d649910488f1acf

                          SHA512

                          8db5f4f6d921612fb9fa6a00fdd1e9d38d344807b57c06ada13dd49cfb4ea6ceea7f84b32358ed72dc51e5eba74ab194d92007d592093e55936bb94a26ed06d1

                        • C:\Windows\{A8F17F9A-CF33-43ad-90DD-EE3E94E4852D}.exe

                          Filesize

                          192KB

                          MD5

                          c94f834b5d81c9ed9e8cc364bd1ead95

                          SHA1

                          959e69b6f063fa4de8e2dc010384687415dff15f

                          SHA256

                          4c3fac2b9abcb84877f88678179557bd761a9cfcd3d87f3d44d52133c11d4a5f

                          SHA512

                          90e50ce14b626fbf8fbc93bad7a1151d905cb5ef44d0abfbab1f7c5e9ea3748a6c461cf804c585a8fdfb2a69f4eca12e77824eefc17a249d5652919a25d9dddf

                        • C:\Windows\{B6B3D0E6-EB9A-47ae-B173-AF094D27A429}.exe

                          Filesize

                          192KB

                          MD5

                          c8f6b9ce961ca8ddd5b6efa7d084f3c6

                          SHA1

                          7d4581421cc2c63378187252397ac74f9c394c42

                          SHA256

                          ddf98533a0e2f97141d93ad7a92a428880bd29f60bda9b00c959000fc4de2c6b

                          SHA512

                          08c6d426ea0ba298040da0e4f9287c2539daf110c6c6c29abd382e0603ece698578267c01c0473d1b1bb97ec1e6fb4df1e92705ca13c9b5a51870097c10d775c

                        • C:\Windows\{B9D3EB19-AB49-426a-AA36-C44AAFB464CC}.exe

                          Filesize

                          192KB

                          MD5

                          3e53e10cc9c3c5b277105da089d4b731

                          SHA1

                          e9b5c933fc163b4b84ef0b931bbbdd567c22c927

                          SHA256

                          06c6e471473c72779b651995fde70976465751ca157003f2c6603cd3e0bf90da

                          SHA512

                          1cd8d9c3b3fe17c6665828e4a7f82c15a3b5553758353fcb265e8759ab2a41a176de61b02a8a1fae0d5fa98938a228e0a4ae3595065c5c899883189fe1fcf9f6

                        • C:\Windows\{DF5F5DDB-9A01-46ab-A18A-9362F58C05D2}.exe

                          Filesize

                          192KB

                          MD5

                          a3e13c3897ba1c04a6df4f048a822c1c

                          SHA1

                          ba2f6a85dffc6516c63ea0dfa159745c421b02fc

                          SHA256

                          aa98bdd1da5251cbcd9d65bac33fa3e0bb68820c5270f4b7ffd46be29ae1e7cb

                          SHA512

                          c518ad9cdb6d6f8e7e2ff4eb5021036981ef09d41ffc4dfb62153afc7c9cf699464e76d3e43d1e68ee7f340a99bdf7dd6d714be676e29eda936e3354ff59a0e7

                        • C:\Windows\{EACBA903-3873-41db-A968-C419B278DE6F}.exe

                          Filesize

                          192KB

                          MD5

                          31c050d3a13da281de896ea3495ecd3f

                          SHA1

                          544294f0f4e0f99d6c3391864a24d6eaf2a79c93

                          SHA256

                          9342b620e2c7ddc3e4af82c14a7a74e90c776066fd300e47375760dbc14a18c9

                          SHA512

                          1d0a2eccafcc96e31908c91807736eb8f1ea16b419ec917dc69125602f0729b8d03874c8555a2f04e59631e00c467c2b11bf35c76ab973c568adaa8e516e2b67

                        • C:\Windows\{EFA60342-6B07-493d-BF46-0ECC15BEB1A8}.exe

                          Filesize

                          192KB

                          MD5

                          1d94d2f4467851c33a4ec0e307cdc770

                          SHA1

                          420a777f4c067b3cf2cf295e037dbe794398e8c9

                          SHA256

                          4d76e8fa31d6d4c88ac933599562fed80115d8cbe79fa62e3bc806f7c27b659f

                          SHA512

                          d15f1ce52a948ad7c4f15fd67e34daa8b851d249c30541892aa15531f7055bfdee90c67bf923f34f0b75419d0a5ef34bbbd2e17b24c97b0e948727aa6ffd413e

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.