Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 12:37

General

  • Target

    2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe

  • Size

    197KB

  • MD5

    8ce1951ccb871f83d69381b504acc994

  • SHA1

    26a30140e353968d907cb9a7a4edd2ab85d4cc4e

  • SHA256

    9ead615da1cebcbd0fbe53d49d225ea77d42c67bd189a33ea2ad9b23b260c319

  • SHA512

    35882422c5da722b6ccade579e092639bfc6557040ad9c49c17e5fcdd374c16960a9019a5e9fb9724b248aae7302d497d33200a3a7f2aecd9b837efceb44fd7c

  • SSDEEP

    3072:jEGh0o5l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGblEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-21_8ce1951ccb871f83d69381b504acc994_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe
      C:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe
        C:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe
          C:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2424
          • C:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe
            C:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe
              C:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1084
              • C:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe
                C:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2512
                • C:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exe
                  C:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1980
                  • C:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe
                    C:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1048
                    • C:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe
                      C:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2520
                      • C:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe
                        C:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2320
                        • C:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe
                          C:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9DD04~1.EXE > nul
                          12⤵
                            PID:3008
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9B900~1.EXE > nul
                          11⤵
                            PID:2152
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{393EF~1.EXE > nul
                          10⤵
                            PID:1696
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{64118~1.EXE > nul
                          9⤵
                            PID:1176
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7AA35~1.EXE > nul
                          8⤵
                            PID:1444
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CE4AF~1.EXE > nul
                          7⤵
                            PID:2712
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A2F04~1.EXE > nul
                          6⤵
                            PID:1728
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AA160~1.EXE > nul
                          5⤵
                            PID:2404
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{32250~1.EXE > nul
                          4⤵
                            PID:2456
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A0917~1.EXE > nul
                          3⤵
                            PID:2732
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2916

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{322505D3-D3C6-4f68-AEE7-3D8C644ADBDA}.exe

                              Filesize

                              197KB

                              MD5

                              b6d3aec92b0bf07ba0821eaef66db54f

                              SHA1

                              592b3bd67416b0cd4cc3e34614f258349750c0a1

                              SHA256

                              ef15ff8ba109ee76dd41ba2bde2fcdf1034aa3b0475a0c06145b16c2584583f9

                              SHA512

                              eec27c6c1e1d7d14a1f1b4ed1caaccc6409f8db90d289cd019a6a7d75750002160f7776029a69fdccfc6717069d99337979ba74ea1ca899940ba01628c2d8370

                            • C:\Windows\{393EF6C6-FC4F-4508-823F-9347DC065C39}.exe

                              Filesize

                              197KB

                              MD5

                              9d9854330f1cf40ea37a73d5377e6fcd

                              SHA1

                              d6f6d4a6c59f8db1e9b5b9a341833dd962c6ae27

                              SHA256

                              f30add2a092d2b6a45a12a4768b9a4b160198bae244d141566cb382ca7b566ec

                              SHA512

                              0f1840835529dfbdfc91879162c71ad6facf8de3da639f3228d7b764845e1d874f4773950d31e38902917ba9acaf1258bf2249d54df35cadfe3512e5fdab093d

                            • C:\Windows\{5A9F3F18-393C-4d2d-B039-DF9D02687EA2}.exe

                              Filesize

                              197KB

                              MD5

                              e4f1ec5be0ec57bb4abccb7bb40b9468

                              SHA1

                              38ee06579a343ffc48b7c892a589912221b85ee6

                              SHA256

                              caa59b2519a4ae44786a62dc2b8f0ddcf4e7e3ce700488eff50252b214c90801

                              SHA512

                              2da3b3751d2d47a7fa27597a2db6ac68f19ec4a5bd42e38f228f7771b7827f1f8b716ecbaec4a3d8eec9a7088b3c543dd8ddc3e778a41d4271d78a03a6de154c

                            • C:\Windows\{64118DD7-3937-4a27-AF22-17D23331122B}.exe

                              Filesize

                              197KB

                              MD5

                              ca89bff29235d19ab329d6a44cdd7d76

                              SHA1

                              5d50e38b5108d18bb64665238727be8d5807c1e3

                              SHA256

                              cafc08eb840b22647f0ac32ddc2bd9cbd90411c65c2b61c1535b7a357fb299c5

                              SHA512

                              75c0a498e70b3b83dec18640bf9071139327510f156051f2f212bd461bef71539c18efcaebdb58b44eb54e01367238d219d4b764f2d402d580e01b4d2a39aa7c

                            • C:\Windows\{7AA35824-ADAF-4be8-8654-ACECEB589456}.exe

                              Filesize

                              197KB

                              MD5

                              1933eb1101192d81bf34e248e0de7c43

                              SHA1

                              e6ddccf9bcd7d1bc6683a8505996eca1fbf6d617

                              SHA256

                              90ebeeffbcf55ee99df8c64deee5b8ed90c8457a0aafb6fa3c0f4f0285c21a4f

                              SHA512

                              2582ac8c2d1fd05a52b7364bcf593b23b9b41778b24863dddc9240c6f011c0a45aa67d4da8a2cbc91c5de6f5048fe3305181784fb2cda87c45eef00aeb73f98f

                            • C:\Windows\{9B900FFD-9221-4c74-B807-8BE051D3227F}.exe

                              Filesize

                              197KB

                              MD5

                              597da01be46eccd94d8ce3f6bb3ba0c1

                              SHA1

                              fd861993b0da3253beb586b328a4812140dc76bf

                              SHA256

                              6ee3aae8e6e6d2426ad2ae9b786b9a6e9ccafc5aed332ef0c5613ba43460ace2

                              SHA512

                              420e3534ebd058b47012738ed44bd58209910fce01ceb15f19c9d57493a9fc8eb293242d887613039b0b4be8a20eff46ba4343b8c743a4c6c591b8815cb611c8

                            • C:\Windows\{9DD04A7B-34A6-4223-A5CB-4949A50C3FF1}.exe

                              Filesize

                              197KB

                              MD5

                              076c7a404db97470d10ef74958dc492a

                              SHA1

                              26555623235b0dfa30b4991b0ee81dc9dbb89674

                              SHA256

                              689992d7b295aa333edac195540f9e1491881e5a4eb56934a57350c59e0e8534

                              SHA512

                              efeb92f2576454d9be4de05ef8ffa00c53b5b99d362457ce11b901e8aa9326803e5706e0831608b8f1c2bb59ac13b848e7abdc6a3e937cad3fa2a1de8796f06c

                            • C:\Windows\{A091726B-8068-40a9-9E53-221B4BA0D8D2}.exe

                              Filesize

                              197KB

                              MD5

                              2b7fe065190b3a5de9f3874bd3317d9a

                              SHA1

                              98383fea558f9abeea4347c60becd2ab810f3a9b

                              SHA256

                              8f89185fe6b170d4bfa62f6c85a8a3d1d24f3538bd4970fee78f3b2ad310e019

                              SHA512

                              beee88dc8667305d74ff4364d379dde88ff31ea51217f3fd7ab07cc65d13dd7aec694a498b4e8f66436708accf37f301bb4b8df8391683122953bdae8a40ae36

                            • C:\Windows\{A2F048BD-AA2B-4424-A3CA-DEE56ABADBED}.exe

                              Filesize

                              197KB

                              MD5

                              3219147e3f631d74fe57d3e04e13b75a

                              SHA1

                              3bbb25f3b7b5071c0e40ebc6e2ac5f68588895c5

                              SHA256

                              0aaaa437cdedb681a19e23d3fae2ab28e1d75102d259b4980e437db8d6f9a632

                              SHA512

                              9931de782dc4466afd4bbf314285b7d9462cdf890cc43fa3ab8bbd0704bf4ca1b5cf8778e28b379c08150b6df16603ffc2ee2c2479b88ea36a2d7b314c3396fb

                            • C:\Windows\{AA1607AB-5AD8-4706-B55C-76A272E76BB4}.exe

                              Filesize

                              197KB

                              MD5

                              8a94b541c734de909e0324dc35277e8f

                              SHA1

                              6653607ea702939bf474c6b0bd1a9e723106c2ac

                              SHA256

                              97b6bd681a410882ad8ba4fd647abed2ee293ca724a1939e8ce631108403782a

                              SHA512

                              ae74721037bb440b4d014c04584236ab3b5d3cdf8ee0cd77337274c10d8dc7b18094f7dc390561fc1b3037df2ae080285aa289e69c243179c41967118c381562

                            • C:\Windows\{CE4AF260-A957-42a7-8D43-71D49E9DEFCA}.exe

                              Filesize

                              197KB

                              MD5

                              cd094bc9929cf7d227cd41f396ee6cc4

                              SHA1

                              13595728619bc8b0cc4a8ad4b4b09c2b747a4c49

                              SHA256

                              548da506373377779e5a7beebe985b2e69499c31a0c2bc9decea1bca1e8db500

                              SHA512

                              c5df5c169a92ffa2287b3d45f763629e7333b745b8370a338a2f722f21aa4c471ce6d147c8434cb00301d2162ab5da45fe402a0821d8affa7c61419538ea391b