Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 04:47

General

  • Target

    2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe

  • Size

    372KB

  • MD5

    59f9380af5f5c128880eabd072f29eb6

  • SHA1

    b6c491e8953749262484bb88f45505b17b4ff9b7

  • SHA256

    be2db5017c986643b34d51b1a90aff35e4555b6f2a2bd8529fd0e08fe5489269

  • SHA512

    154da84aa6cb419d73d716cfe5a361744baf686351c084a7debd0a77b75757f0d3c05441cf5c4e28599a19a243775b24b74107ebc941089d41bce064502828d7

  • SSDEEP

    3072:CEGh0oLlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGBlkOe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_59f9380af5f5c128880eabd072f29eb6_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe
      C:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe
        C:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe
          C:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe
            C:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2900
            • C:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe
              C:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2428
              • C:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe
                C:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2880
                • C:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe
                  C:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:320
                  • C:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe
                    C:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1584
                    • C:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe
                      C:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1316
                      • C:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe
                        C:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1952
                        • C:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe
                          C:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:488
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8B4FA~1.EXE > nul
                          12⤵
                            PID:1036
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D3D84~1.EXE > nul
                          11⤵
                            PID:2820
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{830E4~1.EXE > nul
                          10⤵
                            PID:1784
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{360D5~1.EXE > nul
                          9⤵
                            PID:2200
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9CA03~1.EXE > nul
                          8⤵
                            PID:2208
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EC25F~1.EXE > nul
                          7⤵
                            PID:2888
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9840D~1.EXE > nul
                          6⤵
                            PID:2744
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9FD45~1.EXE > nul
                          5⤵
                            PID:1808
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{999ED~1.EXE > nul
                          4⤵
                            PID:2732
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A4499~1.EXE > nul
                          3⤵
                            PID:2628
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1712

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{360D5561-3D6D-4a3d-B50B-8A283566BB52}.exe

                        Filesize

                        372KB

                        MD5

                        516d42169aed18d0f29eedea74e758c0

                        SHA1

                        8a17d0f445ab54a239119c9ee61ebd566418cdd4

                        SHA256

                        cbd4b4af740af1b0c4ef9542fd64241646ba4ef6b44f090aa68a12d437aee4c3

                        SHA512

                        759f18fa0d347df7ad835c9f4a3c3696b479ee57bbf3e520c48b1629320482454bd7694d97afeed1223c5df18f45dc9c255576a1ddb829d2a3cf64ecaa3b2eb8

                      • C:\Windows\{830E4CCF-5BCE-4138-9C0C-E8E4A718AD55}.exe

                        Filesize

                        372KB

                        MD5

                        10aab34dd5d4478adaecf0ca41f521ec

                        SHA1

                        9bed507c44da3bdd0da5897207b92c381e9d510d

                        SHA256

                        08d298ab62afe26fac13cf62820785320dca5126bcddc01d12756835efef2e37

                        SHA512

                        c8fe40aa34f04b713f36fb44591afe13c8118574d809e507ea77dfc3effcaf038170a95c5736226e1d971b6b4e5ab88a211cfba2c37f56fbf06f52f123ecdf3f

                      • C:\Windows\{8B4FA8F1-1380-4cd6-A207-F181F9E701C4}.exe

                        Filesize

                        372KB

                        MD5

                        8f21b2bde1b836e60b912beace11e35d

                        SHA1

                        99583e19146ca45074ccc25355ea245297e931b8

                        SHA256

                        5a9a5064570ec62336d165b6405650490dd7366da233f2225dc1f18820b14aa0

                        SHA512

                        cabcf373c8247ead91c6b11f03a13eee990e24ede2480d79312bed9ffb213e4d3b63c029489e63074fc1f85289a2a5b93ce49eaa159bca75711c8f8f68dea74d

                      • C:\Windows\{9840D128-AFB7-4d37-BCF4-787866B5E11E}.exe

                        Filesize

                        372KB

                        MD5

                        3ad4b869e7daf6238288956053b6e3d5

                        SHA1

                        3002f6ca18b234ab7d0a099f6c51e52abae025ca

                        SHA256

                        1497d8b48484db37ace8fc1a970e040898d6485ef4fc680fa543ee45192cf0eb

                        SHA512

                        12c65702227e9e24531ad802699a660748411b4434b27bc737fc89554a9c6987ad7d4399c8ba12e2537f4cd99b6662e23e9bb8b392869e06dda71af5780250ea

                      • C:\Windows\{999EDEB9-2171-46f6-B612-6B5AC9EE6A5C}.exe

                        Filesize

                        372KB

                        MD5

                        ef54d32afbe4fb3057215eb477bea6f1

                        SHA1

                        5eac8a7efaeb21f6773c596343380cc75c38ddb0

                        SHA256

                        de54f1a340bbd7c41338bff8050e8ec3affdfaaf72c25a8f558c2530a90fbd48

                        SHA512

                        39ed4f69c679bc6f22ce4c205126a50fdae861061be1bdcad68f0c7ae882e721afa7265a7d9a9f101cb1ed6dc113dbdbfe9f9b10ebabac0b602119a3281c8041

                      • C:\Windows\{9CA032F2-AB3F-4299-807B-D20522F74990}.exe

                        Filesize

                        372KB

                        MD5

                        c0ad62e57e155d99a370209aecc8793f

                        SHA1

                        62d292fb02e63626032946bf53ca31838fe55ba5

                        SHA256

                        4393135b895adb293b2a38b08812229b2b6008353a10f4b2c1dd36065400624c

                        SHA512

                        7f1d54b654d5b01976f138eb909b29ffb96ab7010c03dd0429fd0676b6bcd146000993b6582eed2a68a62870905c0dd844d3e319a59279b5b40eadb70e072803

                      • C:\Windows\{9E7893BB-B833-43f1-B8B4-08209DBBD8B9}.exe

                        Filesize

                        372KB

                        MD5

                        27da59ec0492dd45d3f8dda50619c2c7

                        SHA1

                        79eadf748d4743c75404a7427d6e70dd7a3f1f11

                        SHA256

                        d19ced4db49d90483d38af1c7567cce92d366eaadf9974cc2e0285e648b60e5b

                        SHA512

                        3303aead19a2fa68eed77b40932cfd01b21f345ffe2f765d92e33b6480fa7917c07effc8f266e810b0900029d06f7dcd85626a64684c42d19e26ebdc22683035

                      • C:\Windows\{9FD45E0A-43EB-42bc-A7B7-557A54D452E4}.exe

                        Filesize

                        372KB

                        MD5

                        def7e9ed12ffb49d24d220fee750c1b6

                        SHA1

                        ea48c1126ffa167e037fa17efde8564b5d144037

                        SHA256

                        7d349c36e928ea998f5dbde9b6fd1d117b7b33a6f268b56af61d16249e1ef902

                        SHA512

                        09de3db7a9dde791eb17613c75b598e2c00ebfac1800b5ae06e9f30ea1db34e75d1ee55dc89b49289144fd9e9882bd44b7c80cc289533ca9e33eb66511164694

                      • C:\Windows\{A4499410-10DF-43ef-86D6-A2382A0EEC33}.exe

                        Filesize

                        372KB

                        MD5

                        45232c1e05b3dee31578b3693d41c75e

                        SHA1

                        4342800fb2938bf3fe7bf8670c6eb848bf478db9

                        SHA256

                        1fd05e008fe2b14af911c58de3429e17623281923af017e2c3cb93df66acbd74

                        SHA512

                        04f913a59e3ce65417613ef7a8cef7a2af9791c68f0a9979f813068f968f9b148610289797f13de3485d701e9c7273b1360b50a0ab1e632c1cd3bc7c54d020af

                      • C:\Windows\{D3D84DA4-3885-4da5-BF87-F66C2B313A0F}.exe

                        Filesize

                        372KB

                        MD5

                        266d41e1f67cfe99f06673ef26c67998

                        SHA1

                        aea900b6ddbba74c4ce59ea32765d2a4c3eb7f07

                        SHA256

                        e35e81d4df89d8a99bd49c65fc0fe2758056d43054d135a68cac9c7d1c4d287b

                        SHA512

                        cfd9a8c208372d4722db3363b1d7d97fbb67186d11d01b0cd538ec955443d99bc54bca3d14b98f5f5319c6f6a9bfffac7e8d379de15e7347ad4db72a4dc893cf

                      • C:\Windows\{EC25FB1C-1C77-4db7-8CFF-A5D9EB4E6B6F}.exe

                        Filesize

                        372KB

                        MD5

                        83bbe4247e2be0242a800cd4f3034a30

                        SHA1

                        a9a0726c935a90e5381a9dc117ad709bebe409d8

                        SHA256

                        fade603a553451fd5dd6ed9ea6d900a330f06a29d7fc4f6c371417769b1a8128

                        SHA512

                        dbe6bc8606968cf4a091c4bf1aa5b043613230ae5078b28e3c9d1fbbf70e8306b1c4a43cdf0f7eeddc322a1e4059f2d7f4a33e847f0e84b5136b348c2f5fa384