Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 06:25

General

  • Target

    2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe

  • Size

    372KB

  • MD5

    596d8ad771323b80defcf075819737eb

  • SHA1

    28ad828668e0e658d316697bfe926f83302d3636

  • SHA256

    9867a7dd061feb1106d0d9a370d639f8aad95bab3f5adce714e415193f3d330c

  • SHA512

    aabe0f94ccf70f5ced06e9aa7e365cc7e346d427bfd21eac9b07d63ebabb5490d2d45f804e0a0eda55701ed26411a66c0080f6d248ed52c61362fb64139fd948

  • SSDEEP

    3072:CEGh0oblMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGllkOe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-21_596d8ad771323b80defcf075819737eb_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe
      C:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe
        C:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe
          C:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe
            C:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2452
            • C:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exe
              C:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1676
              • C:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe
                C:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1920
                • C:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe
                  C:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1436
                  • C:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe
                    C:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1996
                    • C:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe
                      C:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2816
                      • C:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe
                        C:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:936
                        • C:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe
                          C:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:288
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CFBA4~1.EXE > nul
                          12⤵
                            PID:1468
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7DC11~1.EXE > nul
                          11⤵
                            PID:3040
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{68902~1.EXE > nul
                          10⤵
                            PID:808
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7F879~1.EXE > nul
                          9⤵
                            PID:1664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D1E32~1.EXE > nul
                          8⤵
                            PID:1948
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{05F0C~1.EXE > nul
                          7⤵
                            PID:1936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BDAA3~1.EXE > nul
                          6⤵
                            PID:1716
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F1E1F~1.EXE > nul
                          5⤵
                            PID:2512
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9AB98~1.EXE > nul
                          4⤵
                            PID:2572
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EEF27~1.EXE > nul
                          3⤵
                            PID:2548
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2396

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{05F0CFA5-937D-4490-9705-33F154697F34}.exe

                        Filesize

                        372KB

                        MD5

                        bdb75836541de2d3ef6d5ba2d3591b8e

                        SHA1

                        1e23c287dc7979908a334cc3e48d0086422ce1f0

                        SHA256

                        445ee628de98ba2674bd71bc3d98f6d36d31e0888a7f0352c4fb8a3755d1a6b3

                        SHA512

                        ce8f1764f7d628545a7934ceb998849441e784e977a02ba275edda5dd52d33c85d433d637c1db2cd93dccb7898a09675b27d3d6df66c51f5baf8703ce8dd5768

                      • C:\Windows\{1401E8C1-EFE9-4c32-89BA-329CD3AEFF0D}.exe

                        Filesize

                        372KB

                        MD5

                        45dec889bf05aa25932e2b97ffec0bb0

                        SHA1

                        df8d4e397fe71c4e9a9aacce257a9c21acc73f50

                        SHA256

                        a8447c3d905d23aabd6cde21f68b0bb837bf6a0f93d70348926a8426ac57b826

                        SHA512

                        4c1cd209e786eef73ac6dfb090b3dc26814f6f828386dbaa59b5349fa4b23f5ec89888e32cfa384b14375875f8cd833cd13e01cd051621aa8c19187ae71ee6d4

                      • C:\Windows\{68902AD2-5EEC-4c7c-B740-A36BC52D0788}.exe

                        Filesize

                        372KB

                        MD5

                        6ab3d7cc9432b8d58280860c84234fa9

                        SHA1

                        62e4c70fabd65470227087cec80d67b5e5285176

                        SHA256

                        089b300317bf7325b2e2b2b1e32f2fa14041984a55aebf057a134109943bcb7f

                        SHA512

                        92717c90518d5f580fb389ed134f0931a3ec1534143b91d00cb81c4be6330accc193cdd25ab036040d9882802a7206ae176e7566003ecf3c61aa83942702ec72

                      • C:\Windows\{7DC11C69-9D08-4eab-A62C-FB37E45437C4}.exe

                        Filesize

                        372KB

                        MD5

                        cebdd0cb03d753e7a37aebaf58116656

                        SHA1

                        bb3333ea83ed3d0a05287f51729a5ffdd1a97115

                        SHA256

                        6e04a45daf117af7715dd13f49324b52f59f9fa8b97e5c28aa21a67a4c7c7b91

                        SHA512

                        ad29413cc9133ae929e5a9f6d64effeaaa05c3181c79e66a805d9d600659195cfd43b5aeeafb90f9955b1ae7719f0c536177d0d5c0819bf67691628ab3a6185e

                      • C:\Windows\{7F879F1A-740A-4ab9-AA2A-95CDE21BA4FF}.exe

                        Filesize

                        372KB

                        MD5

                        7574a45c573409c0196f920f689cf0f1

                        SHA1

                        fa9da685db0e413c9e45577745b0b4b2cf95421a

                        SHA256

                        f75b1f4edeff433a4dc895712f65192b7a1277f959d860188ecc6093f177469b

                        SHA512

                        6d00ec753d00130710d9f33336ca51e7dc8624a49973c367c89896b7aead06577735b1b2195a354ddcee1b3c4227cea1aaab83ceacd5a8fa6153047a482adb41

                      • C:\Windows\{9AB9872C-F246-46d7-A14C-029F26C71FAF}.exe

                        Filesize

                        372KB

                        MD5

                        783eed6d817f52944ad60c6445a2ccca

                        SHA1

                        fc99660d765b91fb5bda81ac5b66dc72a0c36ddf

                        SHA256

                        0b8388409a2b21221f6c38cd877374ebd21e0b74662843e6972ef1cb5d1f3dd0

                        SHA512

                        31ce841bee5f399b9aaee531e9720c862bf9febcad1a328b75bd034dab016dc9c2e56f8159a5f4cae8cead3985777b2a31245ba67e20532caada9470d0ab9590

                      • C:\Windows\{BDAA379B-81CE-41c9-800B-782D45E0B8B6}.exe

                        Filesize

                        372KB

                        MD5

                        93aadbb825596a1643f48607f86ef6dc

                        SHA1

                        9d60bf30aed5b4949fe39dcca4e2c27b784f7207

                        SHA256

                        c9ec279a0ba820a8a9619cebc2c336f7240cd5836af34e0dee619cb9839c3680

                        SHA512

                        a60e08dccda5de4749a06d73b712a0cbf009780f822ffce49889a925fe66e76bd8f631977814beba3432fd04cfcce9de095395d1a6b8bff44101272874052746

                      • C:\Windows\{CFBA49FE-D4E5-48d2-B909-1123F8CC36AC}.exe

                        Filesize

                        372KB

                        MD5

                        a23b811519ceafe4481a9aec9d3f53bb

                        SHA1

                        b8476a1f224388503ff703d676fd886ebaeb2500

                        SHA256

                        44268c66652f9883f2881e3c4d1472793e80d8aaff421d73b6a0b3a1ebffe98e

                        SHA512

                        470c6c41bd469ca42946c39c48be02c5dec0aaf92636e9a548ab8bb6c74db41eac718a21cee5078c6f968a26a07d475eb9b63f2a1196d5e94948011567ef8551

                      • C:\Windows\{D1E32BC3-6E27-4685-9EF4-1A65BB854C91}.exe

                        Filesize

                        372KB

                        MD5

                        a99cd1611a05fa479dda7b0277130ff9

                        SHA1

                        527c48b64a37c0dd57e35f87c9bf2b3c1f118e69

                        SHA256

                        d3c213feb1fa0f02eacc1d34efd00d2e977f8850f9208bc69b2a267c030158c7

                        SHA512

                        22174f7272c192497c0f41420299e7467f822f002e8f11582e0971cba581db4a6e03aee63b3237515b29187ab813d1d22559eef38c927b5d5f2eb6b18ec0e599

                      • C:\Windows\{EEF27E5D-8996-4870-ADFE-440BA28D7C5D}.exe

                        Filesize

                        372KB

                        MD5

                        47cb32ccfffc3c75c1c0f5b5fd078399

                        SHA1

                        7b68a98e1f681b5c8c41677503d7fde34e0833cd

                        SHA256

                        f53b6e11ece475af42b42abbd68203db458574d81130825ea89e6966cf6f2ba4

                        SHA512

                        3eb34fabae2ce5c1f201a8c175c4fe43268316c8c439d2445baf9629a2dc4329e476449c20ffdc320a1b0e74dda8acb06f3893add22e46475dbed65941c7680c

                      • C:\Windows\{F1E1F73C-2052-4788-A254-8F2A538C6A0C}.exe

                        Filesize

                        372KB

                        MD5

                        d3d6e960380d1023889146cacd744f12

                        SHA1

                        664d94b36c6ecc35de151d0f01f0717a521e3f8b

                        SHA256

                        5db841460e78b8876811ab69271c716340c3f69621f149ad84790714d970f762

                        SHA512

                        f66682cbef688e4122c864fde03f988b2fb933b3746c40d1a7893bfddcfae71acdae7b80d71c036bd8c0327d31747979ba67f9008adbaa4adb102892c78ffe4a