Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2024 05:42

General

  • Target

    2024-04-26_0a7f1b0f2256b78d135263d93fb02202_goldeneye.exe

  • Size

    372KB

  • MD5

    0a7f1b0f2256b78d135263d93fb02202

  • SHA1

    5586236647458a93f77143f9da33c2b25727030e

  • SHA256

    c874ffc8f0d844ac7620e00f10649cc6c8575234779343603c91a6b7f1361116

  • SHA512

    bd51621a5aaf5901077c91e2a89fe637c8ae6607944a0db78edbf29fb096a84f80cb559172d9c9b4c81d18eab98b303980a3a0bd226be8395399b3ab429b471e

  • SSDEEP

    3072:CEGh0oKlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEG4lkOe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-26_0a7f1b0f2256b78d135263d93fb02202_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-26_0a7f1b0f2256b78d135263d93fb02202_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\{206E750E-C0DE-46e3-8BF4-8D28DDB90FE4}.exe
      C:\Windows\{206E750E-C0DE-46e3-8BF4-8D28DDB90FE4}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Windows\{04BFE05C-2A09-4b59-958D-E22AD7159F5D}.exe
        C:\Windows\{04BFE05C-2A09-4b59-958D-E22AD7159F5D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\{A8998BEF-94C9-45fb-A739-A351D2EE8CBA}.exe
          C:\Windows\{A8998BEF-94C9-45fb-A739-A351D2EE8CBA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Windows\{AA4AE005-2BDC-44a0-9A05-409B916AF82A}.exe
            C:\Windows\{AA4AE005-2BDC-44a0-9A05-409B916AF82A}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1228
            • C:\Windows\{4F7A39E3-B2AA-4058-A49C-57C630E243D4}.exe
              C:\Windows\{4F7A39E3-B2AA-4058-A49C-57C630E243D4}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2820
              • C:\Windows\{66F5E79C-AAEB-4b2d-B0EB-9B1AFEFD9DF8}.exe
                C:\Windows\{66F5E79C-AAEB-4b2d-B0EB-9B1AFEFD9DF8}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:400
                • C:\Windows\{592E1B0F-6F83-4369-B7E4-655BC0707FF6}.exe
                  C:\Windows\{592E1B0F-6F83-4369-B7E4-655BC0707FF6}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1492
                  • C:\Windows\{5F5672EA-622C-4fec-829B-784F34FBB1C2}.exe
                    C:\Windows\{5F5672EA-622C-4fec-829B-784F34FBB1C2}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1460
                    • C:\Windows\{0004811E-C40C-427e-8604-AC4FDBAF00A4}.exe
                      C:\Windows\{0004811E-C40C-427e-8604-AC4FDBAF00A4}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1936
                      • C:\Windows\{70AB047A-77ED-4c9a-B6B8-150F47AFA84D}.exe
                        C:\Windows\{70AB047A-77ED-4c9a-B6B8-150F47AFA84D}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2548
                        • C:\Windows\{6601D069-81D8-449f-8AB3-A0231C21E818}.exe
                          C:\Windows\{6601D069-81D8-449f-8AB3-A0231C21E818}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2912
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{70AB0~1.EXE > nul
                          12⤵
                            PID:544
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{00048~1.EXE > nul
                          11⤵
                            PID:336
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5F567~1.EXE > nul
                          10⤵
                            PID:2296
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{592E1~1.EXE > nul
                          9⤵
                            PID:1284
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{66F5E~1.EXE > nul
                          8⤵
                            PID:2424
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4F7A3~1.EXE > nul
                          7⤵
                            PID:1604
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AA4AE~1.EXE > nul
                          6⤵
                            PID:1800
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A8998~1.EXE > nul
                          5⤵
                            PID:2720
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{04BFE~1.EXE > nul
                          4⤵
                            PID:2504
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{206E7~1.EXE > nul
                          3⤵
                            PID:2568
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2580

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0004811E-C40C-427e-8604-AC4FDBAF00A4}.exe

                        Filesize

                        372KB

                        MD5

                        ab2bb6ba1c059d518963e6484df8ad0c

                        SHA1

                        1674dfe7676f608c9ef71200ab1124bb11242d09

                        SHA256

                        61708e54e2aeaaa671b618ad4ff4e35ecc861e970f1f3734adf0ae1a658c11cc

                        SHA512

                        b83eb295dcf0a63fc18ee375b7172eff0158af8a7cc9e7ecd92a34e0a73cce7b2e41f136977f71ed0e4df66ab4db1bc23cf693383e57e33423545a5a8d9b8de3

                      • C:\Windows\{04BFE05C-2A09-4b59-958D-E22AD7159F5D}.exe

                        Filesize

                        372KB

                        MD5

                        359776c205e91d003391cf98d5937d43

                        SHA1

                        98820e04704d37170817fbcd2f352bc9582153fa

                        SHA256

                        46da071d890a408096c953ef2932108d7e5a14f81c2a285c77e1241f9166c222

                        SHA512

                        9acd8fe8cc7a778450462efa683db772b2aaf81780609e7575be4cd747d67843d45500860c36444bdf9cab157180193e5ecc28f434b8647a163978235de6764c

                      • C:\Windows\{206E750E-C0DE-46e3-8BF4-8D28DDB90FE4}.exe

                        Filesize

                        372KB

                        MD5

                        4a8d5ba0a98f6313d0fb0abed97bd57e

                        SHA1

                        de7dd7b444cea8dd1e4c31b453c6e179118dcc0d

                        SHA256

                        edf06546b9865cb9c79dec2a53e2c9ef733ac3305f290a1e0f04e3232ef82a85

                        SHA512

                        4471d49de06e6b42490f91c836fe9d774d4c6e5e5890cedb285cbf2b61792fb0c4e939d419c9bc8f0a1ebd3f65e04b70c7ebb67807c1dfaba871472b3049548b

                      • C:\Windows\{4F7A39E3-B2AA-4058-A49C-57C630E243D4}.exe

                        Filesize

                        372KB

                        MD5

                        ba5b892c86e38e186ea718f4e75745ad

                        SHA1

                        3d251f19d416e3f32bb54ceb7e9cae7f3fc1efca

                        SHA256

                        1a32ccacfebe7251b8bd4caad722e527c2cf257f8b2169908df4eb8f6e91745a

                        SHA512

                        9ee1ddcd0457c21371a6fe56fdf56fec706a1902fa59aa6cee69992102afc8807f34dc9ea919a78f7527274bbec3411d06ccd8af2d83cbc338d298f3c8e268a9

                      • C:\Windows\{592E1B0F-6F83-4369-B7E4-655BC0707FF6}.exe

                        Filesize

                        372KB

                        MD5

                        225943b01f89cfc3653ce9c48182c5a9

                        SHA1

                        1bf8b432ceee3f50ad9537cbbe8aa48350afc3e6

                        SHA256

                        65a5c21828bccb3d4546ddb68c22b264398382f0a89f1bae1d05094e4b3889d5

                        SHA512

                        4a548d7b6c08dba579e8bb30cb5f44635f9ea0239f8b5835ff612307b66973f064e08106798ce8b4a940bc8b62061d3542a198e14a533835b5e1e0512825e639

                      • C:\Windows\{5F5672EA-622C-4fec-829B-784F34FBB1C2}.exe

                        Filesize

                        372KB

                        MD5

                        a7f6d7f22d48991ebd62ce57e2e4c7ae

                        SHA1

                        d1928ce48c95d83848f3625a3d6fba617290ae01

                        SHA256

                        9941483d4f825afa5f6d7efd579e18a7d2dd9b2d483d5a0f83eb441718d0342f

                        SHA512

                        c730a2807ef84dae22e039a508b95d67b9d6016163640e53964caf92d6a9f200ae47c02abfbc23ba6c025b95331dca9f107f1813e966211b0f89bb3c77f70086

                      • C:\Windows\{6601D069-81D8-449f-8AB3-A0231C21E818}.exe

                        Filesize

                        372KB

                        MD5

                        078421decf856b534d2399a04a112325

                        SHA1

                        6d8e3ff317a37e0b4a99871c06a413834d79d001

                        SHA256

                        5ed78f6ecabc71a83427f2fdf854025bffb62be50569996c24f013e4c01ad8b6

                        SHA512

                        7449da1303933da5f6a42735db5ecb7c42ec640e9b9db498dafcb508bdc0fd2db2e07b74dd8a61fee007d977dcc0895cb0fbdbc8391930d0b9cbfbdbec27021e

                      • C:\Windows\{66F5E79C-AAEB-4b2d-B0EB-9B1AFEFD9DF8}.exe

                        Filesize

                        372KB

                        MD5

                        3ae966270f495c7184de24ce891cf3d8

                        SHA1

                        6892a3b187885262f593b4d0eca0adcaf8c6af31

                        SHA256

                        1809680ab296f649761238f5ecb38204560cc452472d8465abfb978d7b55e653

                        SHA512

                        d58fbb79871e71bd6500cea7f7e7dbcf504d07874854f1619c8bd6afe4a6515a74b5d29270d15b2723869c3422a600cf1bb402b4f00eadba0833f781a4960424

                      • C:\Windows\{70AB047A-77ED-4c9a-B6B8-150F47AFA84D}.exe

                        Filesize

                        372KB

                        MD5

                        1cad9b03e9f4acdeb138547e40d68f67

                        SHA1

                        98253fb17499adebe43225da705e5a32dec87193

                        SHA256

                        3ea5fc8560c8bdcc3ccebb067412835353ca013fbfc594cac25768a2b9c03bd6

                        SHA512

                        f20f7f93cb8dc22820328e10890d034f7058ed5a60aa7c5aac26a4c8b95cf3284381f90178161bd38afa9fdde23f57e624583844bdbf9eb02a7f7b5b0f94e4fa

                      • C:\Windows\{A8998BEF-94C9-45fb-A739-A351D2EE8CBA}.exe

                        Filesize

                        372KB

                        MD5

                        87c8c411e1db8c9b728056b52e7fd41a

                        SHA1

                        09b33cd0d7d5a726417cb2f40a8754deace59d00

                        SHA256

                        783230a8507e2c40a754e3a2a7657f146e1ba26b39b1d88a23f758173de87293

                        SHA512

                        06c380a7777e54e42ed50009812812c5d61539c72eed6d3eceeb34ae1762513670c3702edeac8863e1ae2a2b018f5fd7418c815d3f7d739bb93a3c377df94dc4

                      • C:\Windows\{AA4AE005-2BDC-44a0-9A05-409B916AF82A}.exe

                        Filesize

                        372KB

                        MD5

                        cc126119d5e5a44c3f429b059cd61b97

                        SHA1

                        18fe35883ddbca59ccf97c4502a5ae0c16c2c118

                        SHA256

                        cb168ca9635ffda4a6c63e6b525c6f8537eee971f14829849d63beb14acc2ec2

                        SHA512

                        dbf00a6690014f8882633ef0e2b08a8a72fcf5122fb0714f6ea455035fe5096bd1a8092c9f12f77998d84b95744f08fb00749dd0c966e2f0cbc2e8ddebb42789