Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 12:41

General

  • Target

    2024-04-11_1b126990d9ab5c8b10b215f564fcbc97_goldeneye.exe

  • Size

    197KB

  • MD5

    1b126990d9ab5c8b10b215f564fcbc97

  • SHA1

    93043cef76b1e1e04586a1e37602bcf896292f57

  • SHA256

    a1688dbf25d82a32fd692f30d1f4e5011ca86a52a332e8c8e7fb44194f0c5e26

  • SHA512

    7f461512982e0fa1d79cfe5dd73437a657590f0ff975a48497001ebfdabd5663457b7013b1067184e32f5222712913a2e43da121b507934b5b55e7a7eb53f347

  • SSDEEP

    3072:jEGh0oMl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGmlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_1b126990d9ab5c8b10b215f564fcbc97_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_1b126990d9ab5c8b10b215f564fcbc97_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\{C6E4EDD3-8672-471d-9AEC-7B6BBDE399B5}.exe
      C:\Windows\{C6E4EDD3-8672-471d-9AEC-7B6BBDE399B5}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Windows\{A1BABFFE-0284-4a26-AB19-CBE77796B189}.exe
        C:\Windows\{A1BABFFE-0284-4a26-AB19-CBE77796B189}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Windows\{0DE083E9-3D5D-4069-90B9-30EF3F42EED4}.exe
          C:\Windows\{0DE083E9-3D5D-4069-90B9-30EF3F42EED4}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4224
          • C:\Windows\{E188B06B-A182-4b31-8190-231D2066583B}.exe
            C:\Windows\{E188B06B-A182-4b31-8190-231D2066583B}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Windows\{8213F75D-CE17-4276-9E48-BACE4F80F0A3}.exe
              C:\Windows\{8213F75D-CE17-4276-9E48-BACE4F80F0A3}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2592
              • C:\Windows\{963FFBEB-1D07-4892-8EAC-16F5C4F31581}.exe
                C:\Windows\{963FFBEB-1D07-4892-8EAC-16F5C4F31581}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3100
                • C:\Windows\{6F85FDCA-65B1-4040-90A3-0D87F2FB7BB8}.exe
                  C:\Windows\{6F85FDCA-65B1-4040-90A3-0D87F2FB7BB8}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1976
                  • C:\Windows\{43FF3646-3E64-4628-AE29-9F36A9639997}.exe
                    C:\Windows\{43FF3646-3E64-4628-AE29-9F36A9639997}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:5036
                    • C:\Windows\{78E9A5D2-E678-4880-88A9-7BC50BACFAEE}.exe
                      C:\Windows\{78E9A5D2-E678-4880-88A9-7BC50BACFAEE}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4192
                      • C:\Windows\{4A534062-D58B-46c3-B7C2-8740CAD48073}.exe
                        C:\Windows\{4A534062-D58B-46c3-B7C2-8740CAD48073}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4040
                        • C:\Windows\{3531E3F5-D8DF-45f3-9872-35B5D1C01405}.exe
                          C:\Windows\{3531E3F5-D8DF-45f3-9872-35B5D1C01405}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3028
                          • C:\Windows\{BB16B071-730A-4f09-BA0F-5BF1AB37E120}.exe
                            C:\Windows\{BB16B071-730A-4f09-BA0F-5BF1AB37E120}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1932
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3531E~1.EXE > nul
                            13⤵
                              PID:4364
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4A534~1.EXE > nul
                            12⤵
                              PID:2912
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{78E9A~1.EXE > nul
                            11⤵
                              PID:896
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{43FF3~1.EXE > nul
                            10⤵
                              PID:1896
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6F85F~1.EXE > nul
                            9⤵
                              PID:2660
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{963FF~1.EXE > nul
                            8⤵
                              PID:2304
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8213F~1.EXE > nul
                            7⤵
                              PID:3988
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E188B~1.EXE > nul
                            6⤵
                              PID:3552
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0DE08~1.EXE > nul
                            5⤵
                              PID:1144
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A1BAB~1.EXE > nul
                            4⤵
                              PID:5108
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C6E4E~1.EXE > nul
                            3⤵
                              PID:2796
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:680

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{0DE083E9-3D5D-4069-90B9-30EF3F42EED4}.exe

                            Filesize

                            197KB

                            MD5

                            429bbbfef97cf77e8b8ffa0347aef556

                            SHA1

                            031ea9fa3e6cfd74e3b7aeeed71de973f57b71db

                            SHA256

                            f7e8c0313c92248d6d2dff3f40835c719574a7da590eb7d90414f2bb2081df15

                            SHA512

                            f7305bcc0a05df210f32b22c7f21b79e4d4b33938cd306cde403e8aa22b32be8d5e8e1d91e71c937a3d031181106948c72bd583bb46191bbe17c82f4de40b57c

                          • C:\Windows\{3531E3F5-D8DF-45f3-9872-35B5D1C01405}.exe

                            Filesize

                            197KB

                            MD5

                            53b5fd3bc3e9589f136befefbabcb872

                            SHA1

                            072a1671222b7e06af84b143b8a7992c6f45bcf6

                            SHA256

                            dd27ddea1025ec172cf426c41a6e6686bada0ebaa38a9bbcee5df70426dbf86d

                            SHA512

                            52388a7d5b9875c72e217995721e46308bafe00ec33c1de3072f483a508253dbc90e921b9b0ba8b6a48cb52c6b4e1efaaa49cb0e0101698edcc1ec2e56abf15a

                          • C:\Windows\{43FF3646-3E64-4628-AE29-9F36A9639997}.exe

                            Filesize

                            197KB

                            MD5

                            2997d85fe8ebdb6ec78419f4928572ec

                            SHA1

                            9a9fb8cfd7e3bf79bdc2cf4c8139489ec87ac548

                            SHA256

                            0e7e313f9e0f6d7366b3878dc4f34ff2a6989e99c9588762b3bd1983cf20156b

                            SHA512

                            299102adfabddcf94c3fcdda8953dbd35a8b82fd62e2f8a8b53ec159498f1a093b9879b6081e6cd1f88c2b86a3d7693af93aae2ce79f24138eea0ae48da9e0ae

                          • C:\Windows\{4A534062-D58B-46c3-B7C2-8740CAD48073}.exe

                            Filesize

                            197KB

                            MD5

                            da8457bac2e297cc03349a24bb3ba805

                            SHA1

                            294cc441a95c9500a2cd9ec674c87f29fb9ffa66

                            SHA256

                            41a34214793c46544b9d7034859ff785418c9d44319da283291857b18f48c602

                            SHA512

                            a901dadf9ff77ee723e291d461e37b42842a50711017705ccd1bcff503bfc8648d4993aa375adf7b1b052dbc747dd143c7b0494a40039cada3ef5dab396ca72b

                          • C:\Windows\{6F85FDCA-65B1-4040-90A3-0D87F2FB7BB8}.exe

                            Filesize

                            197KB

                            MD5

                            b4aa7b2a3eb28a3a65bd4e241040fe58

                            SHA1

                            70bb2b3d1c1a9dc5dd4297550e74420bc489bbcc

                            SHA256

                            214a8d39b3d3e120aaa96cfb797b4863a082c364477bea92408a0b55a38d61ec

                            SHA512

                            dab6d1186bfa5ede124a332349adf3c653b565c3b05398042d1ec3eadf1fb371eb6097505390f31956c45937a2350501fb8b86ee3e29871f5d5d3b78a5ccf772

                          • C:\Windows\{78E9A5D2-E678-4880-88A9-7BC50BACFAEE}.exe

                            Filesize

                            197KB

                            MD5

                            d3778e440f9e38cd130d6d7a1d9009d5

                            SHA1

                            65884d4bb643bd321465fa20b3b15bea76543ee1

                            SHA256

                            93070fd828997ecff61188298ee91851f63bd09745dac129c50f460c718d0549

                            SHA512

                            02e89da10de27f82b543cd8133022fdb36dc7c3e604cbe1ed09b58c054719c41a9e8490c42fb427aaba55c60f6ae9dd2b9b3c5e705d436b53c39c8f0978d95a9

                          • C:\Windows\{8213F75D-CE17-4276-9E48-BACE4F80F0A3}.exe

                            Filesize

                            197KB

                            MD5

                            c60257c9d84d675434af19fff39a3acd

                            SHA1

                            c40349b9a570b13683134a0f8427aa6bf418eb6c

                            SHA256

                            c5dbac36836d256a1a077ac4c7047041eb7e536606aa1a1fbbdbfb02457330b0

                            SHA512

                            82c8dfeb3a06eb421c5c9c2180b63f188f8b5127c9a5f42a58e73824b1a6c2152373e72ee34eadd8d608199f4baefa22af900447a6f2ad62288b02028f136224

                          • C:\Windows\{963FFBEB-1D07-4892-8EAC-16F5C4F31581}.exe

                            Filesize

                            197KB

                            MD5

                            3daabdb66ae01d65fbbef19a192093c2

                            SHA1

                            563a5eed08f80b2689fa814fc16e331f42871102

                            SHA256

                            478f72641e197cb2137cad2fbaef9c9495602da9abe4fa68436431bfe5ecd3c6

                            SHA512

                            dda55c26bba72dccc9cfd146f10ae7d306d72690e7001140e68644d74a333d684856c4e127dafe20126a24e6a2336c5a50a3e678ef343c766508912661b52a85

                          • C:\Windows\{A1BABFFE-0284-4a26-AB19-CBE77796B189}.exe

                            Filesize

                            197KB

                            MD5

                            23dede2586b7abe9ee2336faeeddfde6

                            SHA1

                            0b00d711a8ef63c450f59976cdad6ba2a7edb9cb

                            SHA256

                            4fd7028ce8edff0fa502d98876025d2470325f19560ecebac9fe34465b367d2a

                            SHA512

                            ecc0198e09b563f322600ebd9214a04cbd4f80fcad04384d31b4b61350a0809836eeae88d5611ae1882abe11f652690c52b920fe733f240bdd1ecfd7764ee300

                          • C:\Windows\{BB16B071-730A-4f09-BA0F-5BF1AB37E120}.exe

                            Filesize

                            197KB

                            MD5

                            5b07a042db2384ba9fe7d0cbedc7a904

                            SHA1

                            66524d75b08c091e0be216b9360ded1789fc7fa8

                            SHA256

                            e9d121eec62a89f4b131b522406b452528e49c2427cfd8cb71fa34682ab8e5aa

                            SHA512

                            0cd6a0010852695885edb2ea3bd9e1de85595b084a77cd01655add325dbd842356bea3ef7795ab41636471343ebcc210777ad8cd697e39b27c7cbe6c55885746

                          • C:\Windows\{C6E4EDD3-8672-471d-9AEC-7B6BBDE399B5}.exe

                            Filesize

                            197KB

                            MD5

                            d8abde7e1b64cccd8610ae5e3e686c25

                            SHA1

                            66dc6502dd1afee7d1e09b0933c5de12d1582145

                            SHA256

                            0d99fb1681cb1ec6a57e16e4c7a0aec9e0db16bd5cb13498d7b9b1720eaf3984

                            SHA512

                            be15eef960e9ff01a41bb03e2a284e3d5e59717398efdada4b92072253161d9efcf790386691bc9f869f18011108f16c533f2fe860d2d121fcb4b0af75a70c0b

                          • C:\Windows\{E188B06B-A182-4b31-8190-231D2066583B}.exe

                            Filesize

                            197KB

                            MD5

                            e5e39a7315c260d1a4752aa9b619bbc5

                            SHA1

                            b4e3a8a992a51c505d7886fd9d11cbb69019c9fb

                            SHA256

                            2c91ee41cc6172252af3c5c285bcb1a135e6d67de16866b84ad460038155a559

                            SHA512

                            c19eca4dd3402e55fb8ac2dac2023ffba3c386974f7ab517052195fd786cfca6aeafc8c71387e3d8d590b0f3e3fbb1578392255a0dd667db91eb0be1bafe2992