Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 08:37

General

  • Target

    2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe

  • Size

    180KB

  • MD5

    75521cc0dbd7b1ad9c0ba2e082f8ee11

  • SHA1

    0fe2d946524fe08ce8c4b7cbb80efb044add5eb3

  • SHA256

    0417cc4710d893fbc99844bc4c7405939590e0f44c537eed169909c628c90dbf

  • SHA512

    c4a624fad958eabb9649af410e62bf666fb42a9bbc84969f30cdbd119a6ae995c2b83ff05b48d77d14a82b974ace9e0a7d2093363b3a0e470da7f3d902d62dc0

  • SSDEEP

    3072:jEGh0oXlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGpl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-10_75521cc0dbd7b1ad9c0ba2e082f8ee11_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe
      C:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe
        C:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe
          C:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe
            C:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe
              C:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3520
              • C:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe
                C:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4340
                • C:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe
                  C:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:464
                  • C:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe
                    C:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:868
                    • C:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe
                      C:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2384
                      • C:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe
                        C:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1440
                        • C:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe
                          C:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3476
                          • C:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe
                            C:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4512
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BB7AA~1.EXE > nul
                            13⤵
                              PID:2232
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C34F1~1.EXE > nul
                            12⤵
                              PID:372
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A772A~1.EXE > nul
                            11⤵
                              PID:1224
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2CA7F~1.EXE > nul
                            10⤵
                              PID:2404
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6AD83~1.EXE > nul
                            9⤵
                              PID:2128
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AC746~1.EXE > nul
                            8⤵
                              PID:4684
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A97D7~1.EXE > nul
                            7⤵
                              PID:3472
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AE22B~1.EXE > nul
                            6⤵
                              PID:4020
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E424B~1.EXE > nul
                            5⤵
                              PID:3000
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{052F0~1.EXE > nul
                            4⤵
                              PID:4796
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{24A87~1.EXE > nul
                            3⤵
                              PID:2408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3120

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{052F07AF-38DD-45f9-BDB2-166C606BCFE7}.exe

                            Filesize

                            180KB

                            MD5

                            5fde6986a12f28ae15fa9af42c8d728b

                            SHA1

                            81002a4c977615f11791417d07abad6893de09e3

                            SHA256

                            c87bc151faeca16d437ebc1fa24034c771bacab0e630962596cd0a43fec793d4

                            SHA512

                            15e88f6910dd52271bde6d094362174d8499410e2338e756ae5356726b939f3d00b7e432bafc1c984fbc4364e2c9ed959008c7b15c1a48a522d0e0aba8f1a33c

                          • C:\Windows\{24A87DBE-221E-4b4f-9E73-0E459B4814BA}.exe

                            Filesize

                            180KB

                            MD5

                            dda8a5647ce537994015dac36e628667

                            SHA1

                            33d2b9188fdb3cb68d822d540299a662302dc363

                            SHA256

                            6a283b731ed6be39b4a3677a4b58833087ec61a2136b21ffcf5d7fea6c816127

                            SHA512

                            f88c9c8539ee07765a78bb0d9f7c3b8333680a165812703635430c902dbb16f8059bbb99f6ad3ed03690e5c6a8dc6b32da71f8062b66e62d395e6b391992c4fd

                          • C:\Windows\{2CA7FE49-7B60-401a-AB83-44A3C9AC20D4}.exe

                            Filesize

                            180KB

                            MD5

                            f717e211bb076c7b16e104e6d33f1033

                            SHA1

                            0da76311b4365c4907278a5d74ecb37ced7d1617

                            SHA256

                            29357a9cb82cac77be9c558b5b1253f8ea4115dcf19d764d3a7b0c3958e0b86c

                            SHA512

                            23bbd6acd344e4a5df76598bc20c418efc7ffad6263e6e2d1ee733e1d568b002a55b8e5f23cd5eb1c49e5fc2c4e0480a18592aaf94cccd883d3ab9a2169d95d6

                          • C:\Windows\{6AD83408-72C8-478e-9981-6C0F6E691F6D}.exe

                            Filesize

                            180KB

                            MD5

                            4601fc860ba3796f125dba4c6bd9a009

                            SHA1

                            bdc6a2af6f82ab7127050bdbfc5fb4f0dda0d009

                            SHA256

                            a0d2eb95b010e1d13191d1c18844d8e23b40408640a044fe28417db84f2d90fc

                            SHA512

                            29df356c75817e2e1a2b231fbfbe82a48111071c387c14a13fda71e4e12b73496b92a6cab79e30cef73d01b017e67cedc2129747b75caf3477b6af58b72b4427

                          • C:\Windows\{7BAD9A89-504F-43c4-ADF4-355AE0A71DC5}.exe

                            Filesize

                            180KB

                            MD5

                            cf2398c2b54d8cadfa1da622304fbdfc

                            SHA1

                            bea941eee9e75f9b3213a219ff0d06ea78e53a40

                            SHA256

                            c9c8e6575c0d850269a26c171c6e16ee4fb3982c9d0cfeebdca1cbe3932f7115

                            SHA512

                            9eb90416b7bc2123156ef8e2039c32dd544a61a73cdf123e41b8fb37b860e57651259330528fd5304c032f19910a50f725e52c9a68e779b198244cf51f2b10ab

                          • C:\Windows\{A772AE78-FEDC-4b60-BDFA-F4216401E415}.exe

                            Filesize

                            180KB

                            MD5

                            ce572481cbcaa5bc5b9141f59be392e4

                            SHA1

                            bef3c77c01de59f0d03dbed59fb0ff7ebc771d15

                            SHA256

                            14aeb7dea4aaf40aec192193d297c0b0aca3865715ba0018972a7e702a89bbd2

                            SHA512

                            5deed164acebe59cb400b39c2b817bac83802d49a6ff3fd82236f8023744034868667da6288b9159f33c92ae88aad95a7b6a415429f45f0f8b925ca86068956d

                          • C:\Windows\{A97D745F-C5B5-4252-B215-EC6FEC89480E}.exe

                            Filesize

                            180KB

                            MD5

                            a545371825c8949eb1dfcb1efa290549

                            SHA1

                            470e27b51acc3beabafeb0639ebd46a3bd6705ba

                            SHA256

                            48a8ad1d99d1f62a4d5c1553aaacb89d9571ae1a914f165b0725afb15c3a0bee

                            SHA512

                            2d84f22fa38acd5e6cf92e4634b7e6e9a95f22fb73466f4ead01b7731111656e3ad515b7ba2d0179e912dcb6a7ba92021e2d84aef7fece2d753c0116b3e43a2a

                          • C:\Windows\{AC7465CF-EF4A-4d3c-B990-CCD43C3CCB7D}.exe

                            Filesize

                            180KB

                            MD5

                            d7056528431d9ae394685f3ede04fd26

                            SHA1

                            78c3c9f11f82f67749223d5cdcfe938b40348443

                            SHA256

                            1d21340d3c9c72eacfea983c5845bf47c96a34fff5c25d144982ba591d736fc2

                            SHA512

                            ac56fda09249142c2b1715dced1b81ec4a31d93f895c03cc2b19714b14a83461a8e5f87cc5c3066df7beeec35aa48dd434798e732aea54b03ac241d530a16f9a

                          • C:\Windows\{AE22B5AB-6954-4eb1-9181-ABA9F3B78A03}.exe

                            Filesize

                            180KB

                            MD5

                            7508d4e9fa1db0274bb034d7f23ddc4c

                            SHA1

                            a1b279085c852bcd7abb7b99331a8c1a160cb2e5

                            SHA256

                            c77bfd8d4e46d0d8a55620535a5de23bdfc986fe3f574b25ac84f35b0c49ac6d

                            SHA512

                            7f07938fe6ec4942908088c071fca787a591aa6ab3817b6e7236bef753dc024951ceb6db5df6279ed27e5c39bfbac4e33309461f042cb581dcb898f4b40d54c2

                          • C:\Windows\{BB7AAC60-5234-4e63-AE5B-7808434B7FE8}.exe

                            Filesize

                            180KB

                            MD5

                            4c1a57159406a2ef47364e85c451605f

                            SHA1

                            9bf66626fd1fc7775f718befe87556a1534e5f89

                            SHA256

                            5610969a518aad48775054872ef08a21b071ab5b9b04886579388dda3227b4ef

                            SHA512

                            f32ea5eefa1eb9fc753dc6d8538627e2620a69ea649073da40ae493fc4aa1948fcede96c2392f0df541d9decf5b8af921560e4e43a05c18223dbb08f790b6f3d

                          • C:\Windows\{C34F11D3-5CF8-4ac2-80DD-107C2D4A9162}.exe

                            Filesize

                            180KB

                            MD5

                            714ba6ef985eb6876a2cbbe4a2da741d

                            SHA1

                            95dbdbe5f037683b401952341a7edb4b744a649a

                            SHA256

                            728f072560ea43102cf50a2b75f9db117d32a728e0ad04dcff54c5ee0d8b6ace

                            SHA512

                            78f2422ecab3b7749205f27c167f4ac3ef13fc86544b1b64ebef58e9c6e2232000142ce0e5b842a7bb9085d896ace23424b2462c3f70c3fedb48e7cdbc916cb8

                          • C:\Windows\{E424B3C1-5B3F-4186-9AAE-8670724E5C7B}.exe

                            Filesize

                            180KB

                            MD5

                            b4a4ee2229b32d28c6c8eaa8e90f1219

                            SHA1

                            bf40d314619adf22e301ad4778c012f05873ff63

                            SHA256

                            eabbadfb93762f5e0758866db0dde5da41af15ddddbd33a33de013ad0dfbdceb

                            SHA512

                            1313bdce31903687b467a59aa3fdf7e723aa4c9c1a1071abb04539e77937dc92d91da784dd0547bdcdd645ba02cd4bcc8dc8b57a2ba8016074cdfb7705a97ca1