Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 20:05

General

  • Target

    2024-05-14_7aebed87fa0f2fda96987a41576ec70a_goldeneye.exe

  • Size

    204KB

  • MD5

    7aebed87fa0f2fda96987a41576ec70a

  • SHA1

    8c886d955c37045b6657d51967f45325ac28bad7

  • SHA256

    86d50db4e06a996c70f632d44f0d912101942e09b69301d0587af4d93b9b7b0f

  • SHA512

    76b4de41ab8fa59957bac5b641d24dd3ddbb32bade801420f9e13b976e1567555d3e7a56aa0965485c42701b12ba4492381e6b9c5d8bfcf492e584443dad1d78

  • SSDEEP

    1536:1EGh0oOl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oOl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-14_7aebed87fa0f2fda96987a41576ec70a_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-14_7aebed87fa0f2fda96987a41576ec70a_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\{2D9B265E-C96D-4cf6-9A59-A6537C6B2300}.exe
      C:\Windows\{2D9B265E-C96D-4cf6-9A59-A6537C6B2300}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\{E471A250-921B-4b93-86FE-E28CD0566DC1}.exe
        C:\Windows\{E471A250-921B-4b93-86FE-E28CD0566DC1}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Windows\{8B50F848-093E-45af-A878-C84D1CC4A62B}.exe
          C:\Windows\{8B50F848-093E-45af-A878-C84D1CC4A62B}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2852
          • C:\Windows\{AD866F60-9B1A-47cb-AD44-EB68BEB6C54C}.exe
            C:\Windows\{AD866F60-9B1A-47cb-AD44-EB68BEB6C54C}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Windows\{46464A9B-D517-434e-BB1C-55B226BC7A48}.exe
              C:\Windows\{46464A9B-D517-434e-BB1C-55B226BC7A48}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1556
              • C:\Windows\{0FEF8330-356F-47de-8744-F794285B7904}.exe
                C:\Windows\{0FEF8330-356F-47de-8744-F794285B7904}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1948
                • C:\Windows\{08537601-A0BE-4753-BCBA-020400285C9E}.exe
                  C:\Windows\{08537601-A0BE-4753-BCBA-020400285C9E}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2700
                  • C:\Windows\{8B1AF7A4-5848-401f-8885-08C2F3F88FDD}.exe
                    C:\Windows\{8B1AF7A4-5848-401f-8885-08C2F3F88FDD}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:500
                    • C:\Windows\{3CA6E08F-93BE-41ad-AC39-A27763ED213D}.exe
                      C:\Windows\{3CA6E08F-93BE-41ad-AC39-A27763ED213D}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2152
                      • C:\Windows\{9C5AC45A-9041-4347-93DC-AC60665F289E}.exe
                        C:\Windows\{9C5AC45A-9041-4347-93DC-AC60665F289E}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1704
                        • C:\Windows\{B1FDF318-5223-4fc7-A3A4-E55910134FD9}.exe
                          C:\Windows\{B1FDF318-5223-4fc7-A3A4-E55910134FD9}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1480
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9C5AC~1.EXE > nul
                          12⤵
                            PID:1964
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3CA6E~1.EXE > nul
                          11⤵
                            PID:780
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8B1AF~1.EXE > nul
                          10⤵
                            PID:944
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{08537~1.EXE > nul
                          9⤵
                            PID:960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0FEF8~1.EXE > nul
                          8⤵
                            PID:2820
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{46464~1.EXE > nul
                          7⤵
                            PID:1196
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AD866~1.EXE > nul
                          6⤵
                            PID:2764
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8B50F~1.EXE > nul
                          5⤵
                            PID:2928
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E471A~1.EXE > nul
                          4⤵
                            PID:2100
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2D9B2~1.EXE > nul
                          3⤵
                            PID:2664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:3048

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{08537601-A0BE-4753-BCBA-020400285C9E}.exe

                        Filesize

                        204KB

                        MD5

                        2d439ba671cc602ef471512cb78ce981

                        SHA1

                        64ab7f771eb2abc3957f5ccf1f2fba3c7368c552

                        SHA256

                        4761d63687076c06ede03554f5dd2c8d764a10c89640c1de7a638aeeb81dcb72

                        SHA512

                        7dc79018036b64ec8291e43fb1d1b8714dc34e8672bd75d0035c2ca57b64327dedcf9c26a144e91869822ace50f9b9583d796641d8c7b50ff22afae3e5d08261

                      • C:\Windows\{0FEF8330-356F-47de-8744-F794285B7904}.exe

                        Filesize

                        204KB

                        MD5

                        ef1ae4cd523afdebace6a13867ae5134

                        SHA1

                        9fe1f0591cb3703223a51982839455bf6937b658

                        SHA256

                        b2daf1ad0d5a077dbc4a1d7070842ac18a20c3170a7d6a8066303c89ebcd2736

                        SHA512

                        a67bfb60303aa923e0695e1dd3e4c21b40e1032f2334f396710a2717fb22c633f29073b60cd4d6f11dd27cd6d85e433b81f8742dc470da7ed58dced59ac26564

                      • C:\Windows\{2D9B265E-C96D-4cf6-9A59-A6537C6B2300}.exe

                        Filesize

                        204KB

                        MD5

                        8cb9aeb26e2e583b86369cb2c622ed17

                        SHA1

                        1b616c8efd3cf2cbbf2d4c5977fcac4be4bf4558

                        SHA256

                        abe463a8fcc138d7f0d8cf9a3932e6aef15c8c59503d52f0f4f7dd6ac5e57c42

                        SHA512

                        3b67fc66e710df106ebdf882ddf9c32c267bbd025e31f8de0239725f066511d5513428cb85d806cc22c11461b133ba50d9d5907b6a0d5fc94c778bf8d447b1c6

                      • C:\Windows\{3CA6E08F-93BE-41ad-AC39-A27763ED213D}.exe

                        Filesize

                        204KB

                        MD5

                        83675728a82d66576aa49b59911bb07c

                        SHA1

                        ca306a20d99fc0162afc0e2ffde6e8bcb1c2e5aa

                        SHA256

                        01c9f1a20aa8328972f3127c0db1ea1cd389479f1b1a72a478ce8af27eafb889

                        SHA512

                        b729ccf3423b67c01ef0992603c1422e61b4ce3c5bd04547395155c056a2634b891b45910a80525f374d3e067c7a20fa346e76ec9952d52ffae22d7d575d3feb

                      • C:\Windows\{46464A9B-D517-434e-BB1C-55B226BC7A48}.exe

                        Filesize

                        204KB

                        MD5

                        2cabc65402f56c8012dc2b01ee155c1e

                        SHA1

                        ad15aa89edcf96e4001f9c307897c13ac7bc1b7e

                        SHA256

                        08888fbe9d3d428347078c8d1cc88d0021f3b302dca18d69cfcc38038efea0fc

                        SHA512

                        ad435f395cacc4987d0c2f7ff2a310f946960e5e04215f4d349000b4e5d5f0868a89c5da103fe6ac7805ea67c2d8a6e6ad66b0dfc7864210e7cf174470918e29

                      • C:\Windows\{8B1AF7A4-5848-401f-8885-08C2F3F88FDD}.exe

                        Filesize

                        204KB

                        MD5

                        678dc9820b7df69d9007caec41effb0c

                        SHA1

                        87e125f360696a6f204be28690c156320faa41cf

                        SHA256

                        4ebcc851ae8a843638124b9f05a1d0a8aa285bc77cf6e7f68550fb52045f4adc

                        SHA512

                        1b261a285e88336f7ae17b361c1915d2b3d16db34cb1720829a1f7dc211ce6649f68e8085f4c7565da1f24deeb56f46031c367579779b482ad24ba7b4d594ffa

                      • C:\Windows\{8B50F848-093E-45af-A878-C84D1CC4A62B}.exe

                        Filesize

                        204KB

                        MD5

                        e8c62cfe2f33873b8006c8435e6e656b

                        SHA1

                        6029528f2bd83305508c6b08513b860e09b4387d

                        SHA256

                        45a436bb67bae09c9fbc051229d97c072ec7500a8449d0a219183a3ee797558e

                        SHA512

                        d9d9ec29fb252696ac8458e30f765c6b4fae4c91fb4721435d342c02f1f9c5d346fcb9272e4afe141fe7c71c8e00231cc74661f469f84872bc0f4ac1163b889b

                      • C:\Windows\{9C5AC45A-9041-4347-93DC-AC60665F289E}.exe

                        Filesize

                        204KB

                        MD5

                        8ee6bd79adb495e93ae13b4668be4dca

                        SHA1

                        84504b9b28136254e2fe2f1685391e2f859c6b9d

                        SHA256

                        9162c810b10b1a6632ac67562ac9f40c9dbd67039b1c20b21e42e593428a7d47

                        SHA512

                        271e27d366d41dead55e61d4a38d946584639696680323631e2d1bb5678ce506cc56b41f9db0ccfe57925e19219d8c9164c4af20a8cac042391c7f578be35629

                      • C:\Windows\{AD866F60-9B1A-47cb-AD44-EB68BEB6C54C}.exe

                        Filesize

                        204KB

                        MD5

                        34e963dafc53ed8175d652e5150ddddd

                        SHA1

                        f31b915299d6972a52b8a92cbdd2350e6aecd596

                        SHA256

                        011ba6ed1705c0d125e0252c953959b2661843d648c3e00762dc86ba115d8121

                        SHA512

                        7d870735ca78a5c7bfea1fa2601a8a277d873daad06e76228b13be1161e08055b5a2a491aee020185f3e023a36d5522f0d851b48159d30474107e4f3918057bf

                      • C:\Windows\{B1FDF318-5223-4fc7-A3A4-E55910134FD9}.exe

                        Filesize

                        204KB

                        MD5

                        7e8b903c3c573abf267f2abfe6517399

                        SHA1

                        6426d1a68df2f55688d79372faa8f7777dae872e

                        SHA256

                        a01f13554341a62610eb6d326905f322c5321b103ac10477154e8ea419b35c45

                        SHA512

                        d2086130953a5b1accc4e2fa992da5a66c9b9a1d5beb11e8db989d4869ad0e327fe5ff64848fc75bc6a7fd61fe059d4436fb0b5a961e9f68c573c255787c3984

                      • C:\Windows\{E471A250-921B-4b93-86FE-E28CD0566DC1}.exe

                        Filesize

                        204KB

                        MD5

                        04eba5009c3ebfe594402a77ba5ff8ae

                        SHA1

                        5d27e8ab62f82b46475a64a9e8a58c134a3b8ecf

                        SHA256

                        b6ebf899389271ca7f2f8b7f11c32dcbe8a9459847493aaac97cf6be143fb210

                        SHA512

                        1dc9e4058648af752b6a9e5872bee1b7cafc850062dc9db90b74a092152e6e92a29cbc3f69ac328691f113c3a1b7c15f90c7d2a1af83e92fc136444acd18d0cd