Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 19:22

General

  • Target

    2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe

  • Size

    204KB

  • MD5

    1d6c6704eb0d88b6347cddbf1f93ceb8

  • SHA1

    04a49bd444bc171ee46805da8de2db82424e87cb

  • SHA256

    8d0152315343f712f4035288bd40689f7829d813d58fe6fe0541b8ca430dec59

  • SHA512

    17a58c72f73f43266abc650df27bae775b13d95666529dce12aedee41fe89334d61c7180514be5493ee17fd2a8cdf33140105a8cdf3c45392fd5a391c952fce6

  • SSDEEP

    1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oNl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-08_1d6c6704eb0d88b6347cddbf1f93ceb8_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:312
    • C:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe
      C:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe
        C:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe
          C:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe
            C:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe
              C:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4500
              • C:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe
                C:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3696
                • C:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe
                  C:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4348
                  • C:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exe
                    C:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4100
                    • C:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe
                      C:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:316
                      • C:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exe
                        C:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4492
                        • C:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe
                          C:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3256
                          • C:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe
                            C:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4500
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{188AB~1.EXE > nul
                            13⤵
                              PID:784
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{57355~1.EXE > nul
                            12⤵
                              PID:3768
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B74F1~1.EXE > nul
                            11⤵
                              PID:5096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9D385~1.EXE > nul
                            10⤵
                              PID:4376
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AB462~1.EXE > nul
                            9⤵
                              PID:5016
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4504A~1.EXE > nul
                            8⤵
                              PID:2960
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{CD21E~1.EXE > nul
                            7⤵
                              PID:4052
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0FD55~1.EXE > nul
                            6⤵
                              PID:2180
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{92609~1.EXE > nul
                            5⤵
                              PID:2548
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{291B8~1.EXE > nul
                            4⤵
                              PID:2600
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F882B~1.EXE > nul
                            3⤵
                              PID:3948
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:944

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{05623F18-87BC-4e98-BC18-534764F7E3A5}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  05af0608ab9667ca82633abecc8f366e

                                  SHA1

                                  d69cce6f53c4d59912742cc76cce41596ea3604c

                                  SHA256

                                  4fe19aedd9a547d2b34029afe48155de8bf88194c6181276365eef8c78b22fda

                                  SHA512

                                  3cce11bab92d115026aef1036ec6373bea863961f9973acddc937523a19fcd6aee26b04cfc4f9ea41a3428329e157348af743acdaf5fde6d0cc0b49d8be520fa

                                • C:\Windows\{0FD55384-BA27-425a-954A-4FA633AF1DD2}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  dc9493998edd486a10470fe0b62f27a2

                                  SHA1

                                  79ccdc3132d9a3964526fa0504ec23b841f74951

                                  SHA256

                                  4e2da50a2a5a15f28a1f936d91b92fac286ab814d2f6e68efea347250b47eb51

                                  SHA512

                                  b982754a9588def3f89814b6c61419472389ca815191ba8a55add9422862bc90ac0466a592535bf76775c8dedc2016c96966af7f1f8c45ea3d46c737d763037a

                                • C:\Windows\{188AB7D8-DD04-4a07-8563-ACD305941C0E}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  206f241bea3c193cfb3d12fe04b6d61b

                                  SHA1

                                  69ab27696a62a970cebfd5ca6486b40a6e0a1bc3

                                  SHA256

                                  1bcab5bc59757d80265952b49e4bced4b466a99f7fa09308eebaf6e4b39d2981

                                  SHA512

                                  b5c5467a647cefa162394d8abc7be21484230b862bfcd26a0cf6517d2431383a2b2d58317a6407cf1b660c4f417e69df28cdedad55d9d2dd447e6a5110a8a3bf

                                • C:\Windows\{291B8433-9D43-4533-8AA8-CD66045E8233}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  ee9de2c4533b5d047bafe4162a981017

                                  SHA1

                                  f1b269e40ed846a053a599c08f694f8c3ca2bd4b

                                  SHA256

                                  e987a4baa7c31b3878d2f5460487254f25f1b43fea2f39e8fab94f60f699802e

                                  SHA512

                                  7cccb5d413350bf68f4ae2156a466612d611737d6633a70310c315d3c5b42ce11bc2b17c6098365ce40b2df5a45f011c0155e4825ca54ef913e4f84f94f46b7f

                                • C:\Windows\{4504AF7F-E80D-4f6c-8AE5-937F8BC316E2}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  91a3ab8d77df33c3b9d85379c351d860

                                  SHA1

                                  359f1478953a57fe6fd27173a43967abd13b5f3b

                                  SHA256

                                  33794ae6b58a4c2ace2ec870b1b0ce4a1f825927e509412c436e2386cde0b3db

                                  SHA512

                                  396090b52f46e2f9052d3c572683f494fc2460f576a8c9751d6d8fbcd3cbd47293c72c6844b47cc2b930a73fab13bc8cfb9e8e82780e12ffed39d3c0eeb1cec2

                                • C:\Windows\{57355278-268E-4283-829C-5F7521FB4E7C}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  20db6cd7ba2285bbd40ff89df7d9685f

                                  SHA1

                                  e7cfcdf5c82cec3b30b5780100e89c6cde9c7aef

                                  SHA256

                                  867809aa3ba66404bd1426f2b8e8b070a5dcb01a26b8b33a2fb34d63585c76de

                                  SHA512

                                  d57eca2449c01cb5f7ae7b28b6acc2cd93c5dad6e94e86ef1bdbf1190cd4b497d61ac289e7f39b9d65dd303ba317b8dae578f276ffb091aa9ec36ca787c10230

                                • C:\Windows\{92609EF4-7588-4419-A0DE-4FE1340DFD6C}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  6d34ccf870f9fa14505556951542a311

                                  SHA1

                                  111311f5482fe0643fd473303fc486a58ea6dc62

                                  SHA256

                                  24a669799e8dfe54eb92dc8b3d66eb946cad2b37f228efdb64c11f41642918a4

                                  SHA512

                                  e5c571526c74a5a12a9c51fb123cea7e50777d5c2326a812fafde35ce9f7ba4080f2c16630639ee24797828957763f49eb588ff36a1366409e5374e6c3f627c9

                                • C:\Windows\{9D385D28-3F59-4928-B230-167B8091F092}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  19858a981b87c9d023acc72bc1a3aca3

                                  SHA1

                                  602590edab82afd92a070154f9d97227a2bb9fd9

                                  SHA256

                                  78aceac18bca13acbcd4fdf807c0eae9dcf7b8143c49b3f67819f94188720006

                                  SHA512

                                  2bf1cac887b45b036b2a138aa3886ef804b63266b3b039e8fb27fdc4493168c8a7c26a367fd89a4093fd6481ff94750c21444f628f15f0eb8249e755b3d679c2

                                • C:\Windows\{AB4629D1-476E-453d-BE93-E79C00B13916}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  4b4cbb46ed9240c22bf8c60468f81da9

                                  SHA1

                                  622e3d00eb3c5ae720b09ddaaeea2349440706d0

                                  SHA256

                                  bf78d25e084974b63a252356954f784c562562fd5e59c0aa85323cb92b7a8991

                                  SHA512

                                  4daac03efbe8fd9cf4a885000397d0aa2914b66d980259b3497892e0cdc41650a4190f19609055da6d1f78c83c34a3ca073bfc022c2a9102fd2fcd6adaab6dc6

                                • C:\Windows\{B74F11C4-51E8-4d92-BD66-AA8ED7294FFE}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  d7ca4ab0573276ad2b085f8e1ccdea64

                                  SHA1

                                  939599732898277c99b5a86082d88503da79ac01

                                  SHA256

                                  9764224d66a4f20a411da680eaeed1c7e9321588e24f46b734da424e636f9ab0

                                  SHA512

                                  ec05b747930aa82fab28639833c0ce54973dbc343f9b01e4642ed0c1d2fe4eb898c9a9690d168bee60a40f56afa9a955df351bd95060e8955169c30b97b86bed

                                • C:\Windows\{CD21E757-7367-455d-89E0-9E52F6A819A5}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  bb2731da310e2be3130d8ce7824fb3f5

                                  SHA1

                                  aee893239c2dfb3a8760e95927c1e8e798dbb5f1

                                  SHA256

                                  d9d0677cb64721c92a3d510975d54a24c097eefbd0a60426eb617ecd545dc00c

                                  SHA512

                                  e3422374082b088d241bc773094f216f80cc5b243eb43016649d0cf787e0a4c5d00be0f21da238cd247941cfb8453d195fd88f9e029b42bf6fb55d2ea5565109

                                • C:\Windows\{F882B550-9354-4ca1-BC24-910196BBB6EA}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  221ac481105e2e842bacd79cc3afc1ac

                                  SHA1

                                  6166802baea537b830452f0d6778abd4963a0d63

                                  SHA256

                                  09ef0d7680f88351d42088c09ca563db28ffaed643e900fcc1946deea2085a24

                                  SHA512

                                  e1f74ad7ce79136c12be3413bbab131064c6a782a59b6259955efc1fdd025a590b2a88f768d0eb24d3ebb049ef0ae732958d1f705103dd0d63234cd3c8b5c3ce