Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 03:44

General

  • Target

    2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe

  • Size

    408KB

  • MD5

    1dea083728814ed3f6207e6058f86fe8

  • SHA1

    33f66f1844a3a16a07dcb1ab5be716f339923dfb

  • SHA256

    7e902adc9ab0a2940276369b176db74e2e14d4bc196bb043bdaf594610d6596e

  • SHA512

    5e7f271830c5fac73ef767882664923e3070ec9965e82681d946739f1ab670594f064d62e0cc896ea946729128803e827e9e2ecf5cd1eec7acfd87c38fc69a86

  • SSDEEP

    3072:CEGh0o6l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGoldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-23_1dea083728814ed3f6207e6058f86fe8_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe
      C:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe
        C:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe
          C:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe
            C:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2344
            • C:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe
              C:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2356
              • C:\Windows\{06E699E4-A023-4973-9568-834676283596}.exe
                C:\Windows\{06E699E4-A023-4973-9568-834676283596}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1560
                • C:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exe
                  C:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1564
                  • C:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe
                    C:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1168
                    • C:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe
                      C:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2240
                      • C:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe
                        C:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:536
                        • C:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe
                          C:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2864
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7708C~1.EXE > nul
                          12⤵
                            PID:2732
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{70DAE~1.EXE > nul
                          11⤵
                            PID:528
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B3A49~1.EXE > nul
                          10⤵
                            PID:396
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F7296~1.EXE > nul
                          9⤵
                            PID:2024
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{06E69~1.EXE > nul
                          8⤵
                            PID:1664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9644C~1.EXE > nul
                          7⤵
                            PID:1616
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7A133~1.EXE > nul
                          6⤵
                            PID:756
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{34C5D~1.EXE > nul
                          5⤵
                            PID:860
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{092F5~1.EXE > nul
                          4⤵
                            PID:2676
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{106E5~1.EXE > nul
                          3⤵
                            PID:2572
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2612

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{06E699E4-A023-4973-9568-834676283596}.exe

                              Filesize

                              408KB

                              MD5

                              82f561a407b3bc98e580a7d1c9faaa8a

                              SHA1

                              601fc78d0bb9a7787994567b96d03fc78afde0d4

                              SHA256

                              a8174369225be9d75b77aef72f026476df80a0c42da285325340dbf829310a62

                              SHA512

                              a79c9d216fd526c14119cc5c0e3f31b64fdb31bff677399f43bb5f26a87320a46a309a4505bc005a485fd059ca04cf67e801567616f5a5edd3398abeed35f07c

                            • C:\Windows\{092F57CC-5AD2-468b-8F86-73B20EDF0E29}.exe

                              Filesize

                              408KB

                              MD5

                              0095086466652fcdd8935b6d5a6a5e0f

                              SHA1

                              fd6a5186b752563447854e98df32a77dabbc5514

                              SHA256

                              a887c73295bd26d389b04738fb138134527eda8e3ab6b3cb3b213f9d5efa98ee

                              SHA512

                              6d9aec25709cc69001bac0093d9a6682ad0c0da2146b8ffdad36fe0225f38e6038ae825a0bd15893f02830bf7f84708aa979785818ef3f8a1013e31fa4565cc5

                            • C:\Windows\{106E5DBB-4453-441c-842E-6416B688B2B7}.exe

                              Filesize

                              408KB

                              MD5

                              617ff4e7826dd0e0857318673aaf4bda

                              SHA1

                              11e770e0b225e212ae4c79e8c59c96c155e35775

                              SHA256

                              de8c8622a2654cd22fc663ab25fa3ea59da472e4ca81df917fe6c7e5e51ee307

                              SHA512

                              9236911e007d9825482b593a87e700a0bd74d93a53a7b0a8475d274cf84b528867707ba45495db1d45627a7008a4fabf9a95411f1c26b698c9691bb72d2fba3f

                            • C:\Windows\{34C5D819-375F-4c7e-A83D-B1E6C06306FE}.exe

                              Filesize

                              408KB

                              MD5

                              d11decafc947450e10db0ed3a267eca5

                              SHA1

                              be43cfd5dc0d72ff4ad6853fd8fcfbb1c6349d1b

                              SHA256

                              b8f80253ce9893ca3aba2d61f52626adb10c66f0a6721a4169b3230d7534a0a8

                              SHA512

                              d76ca3574364bdfe7a478eb9fe3c3c1cb87d0bf6de796c93eac054a13c6f77a925d92e6654a410ba7683d806f2e1ad9eb1b37c14730ad87097a28480cec5ff0a

                            • C:\Windows\{70DAE97C-B06F-492f-89AC-EFDC6A86A961}.exe

                              Filesize

                              408KB

                              MD5

                              5ee7a23be722f65b581b4681cbea9cef

                              SHA1

                              4fc74a84c4c245cddfbed6734e9f3c1668aec7d6

                              SHA256

                              0b0b476e6cac675ef0ec4730e700f458f1ab44f33f44299add3e2ea189869d5f

                              SHA512

                              ce24b526c450f009887fcb1eb1d55be08ea4bb631d2c9edb08588cdd8db9dea81434b4cabede778117869673641f860b1c2983701d695883c116d81f70835f79

                            • C:\Windows\{72620F2F-7E9D-46f3-8FB2-ECEDDCC1D106}.exe

                              Filesize

                              408KB

                              MD5

                              1dc688d59424684494834466d97c2959

                              SHA1

                              5d87dd15745accb8d96708e85edffd8c29ba8db5

                              SHA256

                              f90774297ec39861648994612f9aa43248022849248f443a179112df14237f4d

                              SHA512

                              2d5b8e6b2c704e57b8624f567ac8fcc403838e812ae24e2420119b2818bd132f979b7551a9763482c192e47266989886ff7c068e390f7039197e8eb3cafd4439

                            • C:\Windows\{7708CBFB-ECF3-425e-ACF2-506A3DE711A7}.exe

                              Filesize

                              408KB

                              MD5

                              916c1dd2c7736be03fee3ba9dc840116

                              SHA1

                              650171eff3125a9c045adb93164812e41d4f9e1c

                              SHA256

                              0dad53303c4ddc92044e56df80cce7e1454ad2c2dc7a46f314da5ffae12a1b26

                              SHA512

                              95c537e102ea6d3a1ae9e3442d5300bde42e0b244fb6df3a9916e0fd1ff84c06928b5cd57926978103e0b779094b9fd97a4d6c7eaeaaf07423a7c4d27196a9cf

                            • C:\Windows\{7A133630-2E31-4797-A6B9-79EF41A73D77}.exe

                              Filesize

                              408KB

                              MD5

                              29a310d4656bf3936311b629ffd4f8de

                              SHA1

                              5f5f05d500d2d9d9b6c5a20a009fc6d54e306fcd

                              SHA256

                              82b6ced693b228fa28c9b511d14616861ef19cf3ece45eaeeabcc188acad6bfd

                              SHA512

                              8e6de02cfeede42fd996c1d06675256ad521dc5452e7bee6d69807abf546767ab8dd5350efb3a9b366729adcb9214358667dde2b64940e647234908d57ce1b1c

                            • C:\Windows\{9644C5A7-3D37-450c-B9D7-829815BAD97F}.exe

                              Filesize

                              408KB

                              MD5

                              e83606e122fc124cb7f738eedcdcbf82

                              SHA1

                              23287a4eef2333753b89e87b8cbd3754948b19f9

                              SHA256

                              552e260385bd55e70f89e638823dc210e04c544e8b134ccf4519f2033e206b84

                              SHA512

                              949bd929f379526d20efc9d6d0e9ac430ae4116eb2d49883d29604f2e08212a0c0803ada158338c70ca7bfd7e563981f03b4edb429355a676a51f882ef70008b

                            • C:\Windows\{B3A49182-5755-428d-B1C1-92D6639E3DE3}.exe

                              Filesize

                              408KB

                              MD5

                              8f5a18691fd196596883c541e61f75b1

                              SHA1

                              0786bf555bf85e6154084fa9366b186500a1dd51

                              SHA256

                              53b714f085cfd58f34e8fd699b6d836ac81fd3c91651d7f383359f28eb8107b0

                              SHA512

                              459f590b2bba0c7bdf25024ef98bba818d1dee4b9d176191e3f74ef77c5445c7d481591f254edd43ef8e286d39024ee0b5f59d24b1a960601b1f9f45c883562f

                            • C:\Windows\{F7296825-BED0-42e3-A96E-432D8564E285}.exe

                              Filesize

                              408KB

                              MD5

                              4084a9d6fdf4eafea6f5ad251fecebf1

                              SHA1

                              e10f3a9d9e4d04f4fe290bad0e20dff163bcab47

                              SHA256

                              0521c5b6c2b18b3f0b8aa46f7dc01dae5ad7e55a0543c661e254164ef264d632

                              SHA512

                              0f845461ae8f569231fce5039680148080f1db5a27567676eaf0110af681aba80f7acffb00a35936bf41cf8b10c8f68e75931864fd86090cb89068a7c508a167