Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 01:32

General

  • Target

    2024-04-11_33c3af8588d4ecfb24129b8b8bc34862_goldeneye.exe

  • Size

    180KB

  • MD5

    33c3af8588d4ecfb24129b8b8bc34862

  • SHA1

    0e4c5a14010cf2c04e6fd6f3b0fa6240d88ab7b2

  • SHA256

    27a046695194353d345f23d2d58e42a27f2f752ae316aea551ba30b04e0d03e7

  • SHA512

    ad3a7775bf3ee3b0e9e97f5dd3b1ba10cf98eae59f751f14026f639fb807eb5bf42115de811e90487e4aff45dacddda03a6cf4e718e89f060f459230393b1189

  • SSDEEP

    3072:jEGh0o9lfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGTl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_33c3af8588d4ecfb24129b8b8bc34862_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_33c3af8588d4ecfb24129b8b8bc34862_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\{C54824F2-EE32-4164-BDBF-DBCA6F079138}.exe
      C:\Windows\{C54824F2-EE32-4164-BDBF-DBCA6F079138}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\{EDB7957D-A78E-4bbc-9BC6-20BA098E91DF}.exe
        C:\Windows\{EDB7957D-A78E-4bbc-9BC6-20BA098E91DF}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Windows\{211C055A-6BF2-4687-A734-7902CDAC4456}.exe
          C:\Windows\{211C055A-6BF2-4687-A734-7902CDAC4456}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\{01CC4037-D5F3-45f9-8A5D-F433082505C7}.exe
            C:\Windows\{01CC4037-D5F3-45f9-8A5D-F433082505C7}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Windows\{EAF06698-9645-4a76-987B-04C4D1DD5F55}.exe
              C:\Windows\{EAF06698-9645-4a76-987B-04C4D1DD5F55}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\{C987FA66-8595-445a-A638-BE4C2506E110}.exe
                C:\Windows\{C987FA66-8595-445a-A638-BE4C2506E110}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\{AF712EC1-8E5F-4dae-A9E3-75F3399B1BDA}.exe
                  C:\Windows\{AF712EC1-8E5F-4dae-A9E3-75F3399B1BDA}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2020
                  • C:\Windows\{0A629214-D254-454f-B87D-AAB735545291}.exe
                    C:\Windows\{0A629214-D254-454f-B87D-AAB735545291}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1644
                    • C:\Windows\{97A51A10-348E-4f36-A366-87CA183A4E5E}.exe
                      C:\Windows\{97A51A10-348E-4f36-A366-87CA183A4E5E}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2908
                      • C:\Windows\{937F8218-ED38-4bef-A28B-E934C1D01926}.exe
                        C:\Windows\{937F8218-ED38-4bef-A28B-E934C1D01926}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1420
                        • C:\Windows\{3AE67494-39F3-4887-9A22-EE9600791619}.exe
                          C:\Windows\{3AE67494-39F3-4887-9A22-EE9600791619}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2780
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{937F8~1.EXE > nul
                          12⤵
                            PID:2396
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{97A51~1.EXE > nul
                          11⤵
                            PID:2028
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0A629~1.EXE > nul
                          10⤵
                            PID:1680
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AF712~1.EXE > nul
                          9⤵
                            PID:540
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C987F~1.EXE > nul
                          8⤵
                            PID:1220
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EAF06~1.EXE > nul
                          7⤵
                            PID:2328
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{01CC4~1.EXE > nul
                          6⤵
                            PID:2752
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{211C0~1.EXE > nul
                          5⤵
                            PID:2592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EDB79~1.EXE > nul
                          4⤵
                            PID:2712
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C5482~1.EXE > nul
                          3⤵
                            PID:2784
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2608

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{01CC4037-D5F3-45f9-8A5D-F433082505C7}.exe

                        Filesize

                        180KB

                        MD5

                        56c2a7ca7d72131609f101cb9b34ac4e

                        SHA1

                        402cfb75dc5629a6a030bf99d55698a7000603db

                        SHA256

                        c6e34dd38e4aae862c85b0d4fec2419ad913beae7f01cb8b9dc760a18e493ead

                        SHA512

                        57aa6e5e06c8ef5e1418d2fc4b2aaedc1c6051875339b32188ae85a03cc141ba4bf99eac2d9b0894a207213235ae8b3cb1400e210401e0f6f659e1c5be3ec1fa

                      • C:\Windows\{0A629214-D254-454f-B87D-AAB735545291}.exe

                        Filesize

                        180KB

                        MD5

                        5b344713413e45df3ac37a39431a2525

                        SHA1

                        cc8f81a127891f943e3050f92416d511ba332546

                        SHA256

                        92ff6c8c3f5b92da59133d0c2b1603cc0fb53fb13de701075a70473c6f89a23e

                        SHA512

                        7b5adca3c9e90293013aaea49336826460e5b47ff9667d8c74687562134bbccd559aea6caebf535cb6dad31b1a0e951f3f37e471c9843e6b6cc066408b13687b

                      • C:\Windows\{211C055A-6BF2-4687-A734-7902CDAC4456}.exe

                        Filesize

                        180KB

                        MD5

                        1590d8559d7e00548766082d9c382789

                        SHA1

                        b35ed33da9a4d3e6e93b6383c5cbd177770931c2

                        SHA256

                        8978aeb962473a935d0437f53104c6298f248067a77526baa7f4aba0760a57fa

                        SHA512

                        bd41024ef12bb6296b04b34000a9e482458567fbb4750782bbe2ab22eb72f5ddb45e37f53e6cb496d5ae6ff56241bb8886902e04770423b5fdcb656a47f308e9

                      • C:\Windows\{3AE67494-39F3-4887-9A22-EE9600791619}.exe

                        Filesize

                        180KB

                        MD5

                        98ce870db1a86b451da6a9dbbd659f92

                        SHA1

                        624776504c5dc9d194d82d610c23f60803b0afd3

                        SHA256

                        3db5ea8fcba15ee88efba538fb29041d3ba73c4ce24d0d3e317d681e78019dcc

                        SHA512

                        55af720c3ee980d470b761c216138b26959d3bc81dc3de31061e0387a17a0d5db7b6036bebb8f7da92b96d5a5ab3416d0e513f9b76608b91bb074c6d03607289

                      • C:\Windows\{937F8218-ED38-4bef-A28B-E934C1D01926}.exe

                        Filesize

                        180KB

                        MD5

                        02f8fe7d9616c27853f4f6bda5630731

                        SHA1

                        c361a8c547be97168b2ee46731221cccf4baa212

                        SHA256

                        b365cd0dc5f244dd1f0a67657a487a4fce1af6c73ab699b355c6ac84755e0587

                        SHA512

                        4abe9739a43c87ce653d7eb7e146bd9f128bb5b2f75f7cb7c610e1cb93922c4588977d6bf0d47224ad07e6e56ec32e4e057f3591a5a2201e73a7546515f3b7d2

                      • C:\Windows\{97A51A10-348E-4f36-A366-87CA183A4E5E}.exe

                        Filesize

                        180KB

                        MD5

                        d27d6048fea92a8cad4c30c7fc8c8916

                        SHA1

                        605049e12c3af5e329a7730b912d175c644f7eeb

                        SHA256

                        0d5e3da98962c73df086471a074bbb42237e931f531d7d0e3db0fe13bc6c6ad3

                        SHA512

                        8a96779bfd08eb69bb117cb2d494c411008bfb78cd77032e950405cab57cc30c7b00f7fa82c05f88021497940db3ce09db6af7c2e4d9b1520da1adfa83dceb06

                      • C:\Windows\{AF712EC1-8E5F-4dae-A9E3-75F3399B1BDA}.exe

                        Filesize

                        180KB

                        MD5

                        037974b879142f4193c64fcc3ac49d8c

                        SHA1

                        bec46a9c564cb37ef24d838691a15836c943f906

                        SHA256

                        97d4d1d560951071865825b7a9b5f8d6f401c2fe437f67914c8e32bc06610519

                        SHA512

                        0019eb9c4e901c88aa6c613cb87eb7e878bc0b69618d218dae18137fd848bbee2a92fa83e79463f9b7558322d060ead88a634e0bb6ca0a7e9715b09801ec7f88

                      • C:\Windows\{C54824F2-EE32-4164-BDBF-DBCA6F079138}.exe

                        Filesize

                        180KB

                        MD5

                        565ed026d38e25b6faf2d2afce19b172

                        SHA1

                        6ee9eb9eb438991ccb9d90731986e35ad2e50bd0

                        SHA256

                        0e321923832775247f3c55a46d69f9de245ea15fee894373777239927e2196f1

                        SHA512

                        41622349946951e32d471b7dcc63654fba79454c52ea32f4f4c0181ea5501294c4c41f7fee7eed8fcb633c2a1ce6bc304b9c671ea0ed10a1da9f4451207a1fac

                      • C:\Windows\{C987FA66-8595-445a-A638-BE4C2506E110}.exe

                        Filesize

                        180KB

                        MD5

                        2619c33c1345bfb9f3bae2fb8eabcaef

                        SHA1

                        4514158c31e54030d14bb631315ca59c6bf7b8b8

                        SHA256

                        5fa0e63e6f44457ef5606558f305741051bc1103ab9c7a824d6b1fbc05de2243

                        SHA512

                        186f3c8309a87e0e943dd4363343643e7ed8451291b1d9af702574631307b26224106c9ac7fbe1ef8c081ba13fa2dc7afd7a3623fe78acae2de40c9da243f8eb

                      • C:\Windows\{EAF06698-9645-4a76-987B-04C4D1DD5F55}.exe

                        Filesize

                        180KB

                        MD5

                        533488ed8f8e4522f23a893ed646dab3

                        SHA1

                        5e6ea4d591bfddf4dd972521d92526aaa6698d57

                        SHA256

                        2b0f15662219ab12942b8d28e16c5358710cd66a8ce40d01945e59e8afbdf6b4

                        SHA512

                        ec7f6e4c9e549c3144a1bcdee80e4b911616ca8d3174cd6dfcf8a36bbe7c3b49caf80523a8c14e53a0dfda8ba7a08fd69d8c0f0aa58ff4871dbd35d119337af7

                      • C:\Windows\{EDB7957D-A78E-4bbc-9BC6-20BA098E91DF}.exe

                        Filesize

                        180KB

                        MD5

                        72df47be9921e9e1f8b7bc2ec0456e62

                        SHA1

                        dff6db17b5c86f449d0afba802b578da609f06dd

                        SHA256

                        cc6a65e9c5d8ea23ef5c0cf837e9733efba6cf833d92d1b50b2ae0fe1b86ce7f

                        SHA512

                        5bb81449991363deab46ed80663bf112f54ff775e4fb10c949c90c80cf5f5c34778a1fc281bfd9e5a0dbe96864bde7faf593054f2285262691896a9ebbfe63ed