Analysis

  • max time kernel
    149s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 22:36

General

  • Target

    2024-04-27_8de7721085c2872c6457605cb8b3349e_goldeneye.exe

  • Size

    204KB

  • MD5

    8de7721085c2872c6457605cb8b3349e

  • SHA1

    27f0ca2467eb8d86a28e35d355b6a781ce7a45a1

  • SHA256

    f30d2da75b123622539ef3ad7551f6600328a2b35ed21520793912024ecfef15

  • SHA512

    cb610a65ab30820486e2fc353bbaf63371a479b208ea3e5ffcd93423de9e5a736878b15302b50125f24691b771eca2acd921ac68fc5e5e1627c2a824940e1078

  • SSDEEP

    1536:1EGh0oUl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oUl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-27_8de7721085c2872c6457605cb8b3349e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-27_8de7721085c2872c6457605cb8b3349e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Windows\{052B132E-56F4-4eaa-86D8-4A0018802462}.exe
      C:\Windows\{052B132E-56F4-4eaa-86D8-4A0018802462}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Windows\{A3A7351E-C86B-4194-89E0-E57384B53A98}.exe
        C:\Windows\{A3A7351E-C86B-4194-89E0-E57384B53A98}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\{36713230-8819-49f7-9351-7681B08CFC22}.exe
          C:\Windows\{36713230-8819-49f7-9351-7681B08CFC22}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3584
          • C:\Windows\{0D662EA4-21FD-4e1b-AF9E-71D8CF90E5C0}.exe
            C:\Windows\{0D662EA4-21FD-4e1b-AF9E-71D8CF90E5C0}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:996
            • C:\Windows\{3172115E-8495-492c-91D0-405E14E5381F}.exe
              C:\Windows\{3172115E-8495-492c-91D0-405E14E5381F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3656
              • C:\Windows\{2D5CD670-DA66-4f8a-8883-D76BD7FC0F81}.exe
                C:\Windows\{2D5CD670-DA66-4f8a-8883-D76BD7FC0F81}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4948
                • C:\Windows\{2ED3729F-959A-47df-BB85-4D10D74B5856}.exe
                  C:\Windows\{2ED3729F-959A-47df-BB85-4D10D74B5856}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1564
                  • C:\Windows\{6AABCA67-09C2-4d74-A7E9-E5601A052E1D}.exe
                    C:\Windows\{6AABCA67-09C2-4d74-A7E9-E5601A052E1D}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:648
                    • C:\Windows\{19218F30-1C3A-4b30-93BA-47BE136670F5}.exe
                      C:\Windows\{19218F30-1C3A-4b30-93BA-47BE136670F5}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2436
                      • C:\Windows\{39BFD57E-7367-42c8-B191-6CCF1F972355}.exe
                        C:\Windows\{39BFD57E-7367-42c8-B191-6CCF1F972355}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1188
                        • C:\Windows\{05C2DD19-E07C-4d9a-9657-7367BEE7B54D}.exe
                          C:\Windows\{05C2DD19-E07C-4d9a-9657-7367BEE7B54D}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5112
                          • C:\Windows\{CF32482B-26F0-4d9e-A8F9-3AAEB146144B}.exe
                            C:\Windows\{CF32482B-26F0-4d9e-A8F9-3AAEB146144B}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4372
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{05C2D~1.EXE > nul
                            13⤵
                              PID:4356
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{39BFD~1.EXE > nul
                            12⤵
                              PID:1208
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{19218~1.EXE > nul
                            11⤵
                              PID:4740
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6AABC~1.EXE > nul
                            10⤵
                              PID:2868
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2ED37~1.EXE > nul
                            9⤵
                              PID:1020
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2D5CD~1.EXE > nul
                            8⤵
                              PID:4832
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{31721~1.EXE > nul
                            7⤵
                              PID:3452
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0D662~1.EXE > nul
                            6⤵
                              PID:1572
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{36713~1.EXE > nul
                            5⤵
                              PID:4592
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A3A73~1.EXE > nul
                            4⤵
                              PID:4580
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{052B1~1.EXE > nul
                            3⤵
                              PID:1868
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:1496

                          Network

                          MITRE ATT&CK Matrix ATT&CK v13

                          Persistence

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Privilege Escalation

                          Boot or Logon Autostart Execution

                          1
                          T1547

                          Registry Run Keys / Startup Folder

                          1
                          T1547.001

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{052B132E-56F4-4eaa-86D8-4A0018802462}.exe
                            Filesize

                            204KB

                            MD5

                            bc707862a2ff3466507b33177693abc4

                            SHA1

                            f35c45db453b997b5f7a74298f6968265b910c3c

                            SHA256

                            62ca1318415f54ca95c9cde9339e496a0805aadee618272cb3b948a215da6bfd

                            SHA512

                            d6511d991934f2bd9c2c2efc19d8c75ab8bdd32602b211ecbda28a62fbcdd3d48dd031d9db15a1ae39913230c6a469e3b2fc9dddbdd6f7479ee844f90ee8a624

                          • C:\Windows\{05C2DD19-E07C-4d9a-9657-7367BEE7B54D}.exe
                            Filesize

                            204KB

                            MD5

                            9a6a8cce96b72f897a3b5c9dc4e2f776

                            SHA1

                            db44c1b1bb21184651a8fbf72ccd2432aa74fc31

                            SHA256

                            61c44ea1a6f4d2220f69eafbf54635f91718ed31502abbfa71db420ecfa8d45c

                            SHA512

                            7f27791afee2c3f254da840b8c16766e1d0dcd0542515943401eeca7316efdc323415b2b2822aaec3727159653cb839d9f6804e27044de077f58e97a7cca6163

                          • C:\Windows\{0D662EA4-21FD-4e1b-AF9E-71D8CF90E5C0}.exe
                            Filesize

                            204KB

                            MD5

                            f69ce629473312a45fb6a27e78c07819

                            SHA1

                            da6693d72041320ed401bfbfff4e6c557e29690b

                            SHA256

                            34dd920b3f9c660ee5171e662240aef49a804184122e8293e4629568242f420f

                            SHA512

                            f28d254369c0e43a78fc573d00f13c48b47af51c44491737a6b1182c6d08ddfe51f96c3a1e54b060a67f39429e1335750e6f792867c76c52b0894995a1ed0b08

                          • C:\Windows\{19218F30-1C3A-4b30-93BA-47BE136670F5}.exe
                            Filesize

                            204KB

                            MD5

                            3bd3dbb149cfe20f1a5c961ea28bf890

                            SHA1

                            b869eb048adc493b4bd40d23f1af919b2f421dac

                            SHA256

                            ccc6e459bbab2d78015db77aedca9ee6dec397257a465d7045f63649f9ac9339

                            SHA512

                            0f5afcb21f18696fc4e3eaf290dfbae71a6834cda76bb6a749434b93a37a287e1b1acccfe967ca2652d4922bbf0a144a982eb71e1bbdb8a376b17671657f4bcb

                          • C:\Windows\{2D5CD670-DA66-4f8a-8883-D76BD7FC0F81}.exe
                            Filesize

                            204KB

                            MD5

                            343228dcfaaf034fb32260fa32b9fc11

                            SHA1

                            77065f68ee1c6efbe1e6545c1b20aad30e9ab25f

                            SHA256

                            d1ab96992e66ac571246cefeb8334d5ba6997bec4b640ed83b6ddc098f93807e

                            SHA512

                            e7d81077932cbab3eeeb162c5fc550533c51e178f0c9a577c99e1dfc256a2038254982988441779e9f97f8e31fe881f3d179c096843082cc6003a36ae93d501c

                          • C:\Windows\{2ED3729F-959A-47df-BB85-4D10D74B5856}.exe
                            Filesize

                            204KB

                            MD5

                            7c2a4a70bf86b3a3875468be571c08c7

                            SHA1

                            c45b23d1faa1cd1d3e1afcd9a4542ba4e88f36b6

                            SHA256

                            ee7779a113e0b3320cfe472f5f45ee0377cfad8ee1e6bec3009a1184caefd783

                            SHA512

                            fc6447d3ce639f8c4454f85c6d39656b53e7afe2e7eab45e0b8aa188c58f68dc8172c542a7e279fb22fc85e2945c1ce90a5c839b9bfdc3390ab0ad9b9b6bc733

                          • C:\Windows\{3172115E-8495-492c-91D0-405E14E5381F}.exe
                            Filesize

                            204KB

                            MD5

                            1d5916afeb80caceb64efa0668e58da4

                            SHA1

                            cd68c1ad4e9f7a63def84e27940da4a067a63ab9

                            SHA256

                            48f97e48f3401b882ee2df23ffe9ae45fb2ced096c1752eff6e7ca0598e0d7d9

                            SHA512

                            f2afbb237e9c9caa9959fcd8a379b891b846a555aa45900f94973cb49f77e7d26a9eabe6249ba5361bf3d55c7820f9039797cd49e05c7cd0122012741488868c

                          • C:\Windows\{36713230-8819-49f7-9351-7681B08CFC22}.exe
                            Filesize

                            204KB

                            MD5

                            93e48f63c9a88b90f456ba4dc132516b

                            SHA1

                            1a973586c02affd0c4bf1474477200bd28a0fc37

                            SHA256

                            b0457c083ebce7aeee4d54d734b97367baa8fdc9761c6326c85ea34cfac905e3

                            SHA512

                            05788660790089eaa6738f777b50d8d165f2a9c4d507831e13a27c5628eb2ab06003ed75e183e3988a8c8a5593b6e4dcc6c0fef76c2010446e6faf33104834f8

                          • C:\Windows\{39BFD57E-7367-42c8-B191-6CCF1F972355}.exe
                            Filesize

                            204KB

                            MD5

                            1318d4087369638352ce4c59a2f2d505

                            SHA1

                            1c67d07bdb47c120ec5e3a41a1e75bcb713c905e

                            SHA256

                            55c117211c1de113f53dec67ebf76956a31a919371f36964fd0e7d27c60f0004

                            SHA512

                            2ab4ed8367b3c0af9d124dd68e98964c87142b717aaae1b4a7e6dc554062bec7d44bf5265fb41e419b6daf31a348af6101caf68f9e9585264e381b13e91ee674

                          • C:\Windows\{6AABCA67-09C2-4d74-A7E9-E5601A052E1D}.exe
                            Filesize

                            204KB

                            MD5

                            06793e3de109fb9d0e962d55c36c0628

                            SHA1

                            82902a6c28d91719133b3f7eed87e7f9d02b0978

                            SHA256

                            0a284329f78f6fc396e0459b9bac0933c579b0caad63e118dc5f9c27e0df284c

                            SHA512

                            da51c2cc0060c6e73e83c7786df7cc68c6d56d6b909aab91e55458e0176b2620b3f77fba76c73e3df63fba34349feacb083b35875eda0b830a0e3013fe7bf066

                          • C:\Windows\{A3A7351E-C86B-4194-89E0-E57384B53A98}.exe
                            Filesize

                            204KB

                            MD5

                            5c2286415a603fdeed82239579f0f781

                            SHA1

                            e1223f74031bcd9ba6987ce7a08e8e4cc69c8720

                            SHA256

                            ac109f66226d04f7ae07e584850c6d99c2c3626257cda44c1e6877f03d40a15f

                            SHA512

                            5c5edb39fc3595c84d9e612166a218b7a50071d6cd2ddbbadd5d2dc0faa46ea236570db7ca4824a32e1cd12097f43b170bcf620b57a65a9aaeabc90a7f153342

                          • C:\Windows\{CF32482B-26F0-4d9e-A8F9-3AAEB146144B}.exe
                            Filesize

                            204KB

                            MD5

                            d48760bfa8a98b450d1d57ac0d149b1f

                            SHA1

                            98f02a66b27f32f34cd12eea98c1bc689ebf9124

                            SHA256

                            8b1736d7f6ed15992e9018ad19558cd05380f862885bba077c026bbde5172898

                            SHA512

                            f231a0181500ab672462e7bf382dc158e9eaace4ff723f16a10988e966f737dcdc98a8380fa28e15e0d716f190cc0aa53aa0752b0bc60adff408873820805f97