Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2024 06:04

General

  • Target

    2024-06-05_81fb0fdeb18661ffddda8ae8885c00c5_goldeneye.exe

  • Size

    372KB

  • MD5

    81fb0fdeb18661ffddda8ae8885c00c5

  • SHA1

    5b0981f410a31e00fd074fd1f6e16203a1cab003

  • SHA256

    77f041c3f8a1b32640cd2631b1416b2876d3a7ef1cbb086d438d663b1fb6fd1b

  • SHA512

    aa4712698a88ceca270eb4494b613ae34de99cf42cc79638c92785dd8de08784209322e47054537ff88553259689b4fc8b418a7fe583102d4efac02e4bb1ce50

  • SSDEEP

    3072:CEGh0o+lMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEG8lkOe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-05_81fb0fdeb18661ffddda8ae8885c00c5_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-05_81fb0fdeb18661ffddda8ae8885c00c5_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\{2FC83296-47F6-4412-932C-E7661998B23A}.exe
      C:\Windows\{2FC83296-47F6-4412-932C-E7661998B23A}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\{269C9DD6-08C0-4446-8B30-467A7F38DDF1}.exe
        C:\Windows\{269C9DD6-08C0-4446-8B30-467A7F38DDF1}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\{C3D69ABD-583A-4012-943E-F440422B6CAA}.exe
          C:\Windows\{C3D69ABD-583A-4012-943E-F440422B6CAA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2280
          • C:\Windows\{4C13075F-CA91-41d0-BFA6-CA55F7D8C69D}.exe
            C:\Windows\{4C13075F-CA91-41d0-BFA6-CA55F7D8C69D}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1360
            • C:\Windows\{1D0FCEC0-2AFD-489c-9D48-C730CD5DB5EB}.exe
              C:\Windows\{1D0FCEC0-2AFD-489c-9D48-C730CD5DB5EB}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1272
              • C:\Windows\{2C85B6D4-1594-4c1b-942C-C7AAA668C461}.exe
                C:\Windows\{2C85B6D4-1594-4c1b-942C-C7AAA668C461}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1020
                • C:\Windows\{316419D5-FC32-4d13-A9C2-380608E4863F}.exe
                  C:\Windows\{316419D5-FC32-4d13-A9C2-380608E4863F}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2368
                  • C:\Windows\{E1FA8B43-4DBE-43d4-8EBD-E1195BD9FE1B}.exe
                    C:\Windows\{E1FA8B43-4DBE-43d4-8EBD-E1195BD9FE1B}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2436
                    • C:\Windows\{7723DDE4-5156-48d9-8DE3-644B8106BCAE}.exe
                      C:\Windows\{7723DDE4-5156-48d9-8DE3-644B8106BCAE}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3120
                      • C:\Windows\{1037BB75-69F8-4319-9848-DA2BD352145B}.exe
                        C:\Windows\{1037BB75-69F8-4319-9848-DA2BD352145B}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1928
                        • C:\Windows\{AA7FD2D7-B970-4ddf-9EE3-1575B58FF1EC}.exe
                          C:\Windows\{AA7FD2D7-B970-4ddf-9EE3-1575B58FF1EC}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4376
                          • C:\Windows\{87F03662-DDF5-4639-A2A7-0A9FC6EA664D}.exe
                            C:\Windows\{87F03662-DDF5-4639-A2A7-0A9FC6EA664D}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1000
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AA7FD~1.EXE > nul
                            13⤵
                              PID:2092
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1037B~1.EXE > nul
                            12⤵
                              PID:2896
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7723D~1.EXE > nul
                            11⤵
                              PID:4688
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E1FA8~1.EXE > nul
                            10⤵
                              PID:4676
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{31641~1.EXE > nul
                            9⤵
                              PID:3968
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2C85B~1.EXE > nul
                            8⤵
                              PID:2956
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1D0FC~1.EXE > nul
                            7⤵
                              PID:4152
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4C130~1.EXE > nul
                            6⤵
                              PID:3268
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C3D69~1.EXE > nul
                            5⤵
                              PID:4440
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{269C9~1.EXE > nul
                            4⤵
                              PID:2412
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2FC83~1.EXE > nul
                            3⤵
                              PID:4932
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3236

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{1037BB75-69F8-4319-9848-DA2BD352145B}.exe

                            Filesize

                            372KB

                            MD5

                            adb33ead74f0e68a7ce2badfbe5b953d

                            SHA1

                            cede1f67b430576784dbdc01fb970201e8e8a05d

                            SHA256

                            97c0646a70df9613e4765716ba526980a7248ee2e9cd375e669efc4904c01e6f

                            SHA512

                            b4512ff854435dd8bd5d90692593a43d3eb9b7155e49349434058de86ff23aa691155d7c3d18fcf7602e5832f13e72efc471f47cc14bc8607035d16bba768706

                          • C:\Windows\{1D0FCEC0-2AFD-489c-9D48-C730CD5DB5EB}.exe

                            Filesize

                            372KB

                            MD5

                            b28c23754cf2a4ee80382e6222eb6d38

                            SHA1

                            74d1f4d7370b8fe13818a21a33f04f16ffb4adca

                            SHA256

                            ba0e1b4933a3710b2c7886fa660f40e837daa54c70620d1e3ef376fd7b04ff63

                            SHA512

                            d91ee96e21d919391a5214b6e18a18d411c2fd9db8a83c68b334e7ef65f6fd86c4f54232e2b986c2aa9926d393807ebb12d7be23d30568871550bec747cad86a

                          • C:\Windows\{269C9DD6-08C0-4446-8B30-467A7F38DDF1}.exe

                            Filesize

                            372KB

                            MD5

                            ffd1024f53d654f03255e4cf21be9d29

                            SHA1

                            8db606a54945b64e6ee775a2c07832fa77db5a1f

                            SHA256

                            95f82816fe2dae7b4f44268af3dbde7d270b7207cd2dadac94e626ba2f27736b

                            SHA512

                            259ab42867fe5e5891ded964f1db2f7ed1123a268a60988e68aedf74b280e65ea8bfc7db372aab55ee57cb0c9e9152259736eb69c4907a22b61afa82a0c15e12

                          • C:\Windows\{2C85B6D4-1594-4c1b-942C-C7AAA668C461}.exe

                            Filesize

                            372KB

                            MD5

                            c9fe207205568569ecd93221f25bb1b9

                            SHA1

                            92e6d5a89554131cea71315c138945ff88073fc4

                            SHA256

                            235e5e798c341379fc06d6fed3578c5434c295a672d3c1be3a13743106fd4aa3

                            SHA512

                            ed62f2ffb822ca2f8a5790c71eec2330d1433a1365460752825a2d9d6b212e12b11e914a70f236b0a3020e9a127d17bdfe12286add5825ae14eff048d8116240

                          • C:\Windows\{2FC83296-47F6-4412-932C-E7661998B23A}.exe

                            Filesize

                            372KB

                            MD5

                            900e983f1c42ec7f40f39c9df9ed7bd3

                            SHA1

                            896cb1a1dba24724b235d9ccb8def1992e9e0ba3

                            SHA256

                            99cf02375c75d89592325ffd52fd1e28735d5c9196ba06489e620941cda074c4

                            SHA512

                            838735d618ec2a3f73943be93569a04b8b3b3d6f60662501f541d95af3bd6ec50d027a509a766455f141de76cb3f35f3f388642130053b0d2a5dfbd8a7f5ab13

                          • C:\Windows\{316419D5-FC32-4d13-A9C2-380608E4863F}.exe

                            Filesize

                            372KB

                            MD5

                            03ea99a5a8b862d6e0712260f1e8eaf7

                            SHA1

                            86cb05b0613a6b6a70cf7c0ed307e32578b8909c

                            SHA256

                            7b4c3acfeeae890a9b74368f0e3accf4d6e2e03c12224133dbdb286fa800c804

                            SHA512

                            62c1e97f253dd090b2ffcc805a76232e4ede5faf2192d380718012b5aa9c37ae2a997130c9978a765c7c3cc01da42a56dea6b9802af9fbbf8e16ce38e737042a

                          • C:\Windows\{4C13075F-CA91-41d0-BFA6-CA55F7D8C69D}.exe

                            Filesize

                            372KB

                            MD5

                            5697f8943621e806b6eac62f732f9efa

                            SHA1

                            2d09abc23adcd616d3832f96fe068b3021bb62e8

                            SHA256

                            627460ae09e4d0997700dab612fe5f9df02a07b22d426cf2797e4518beb30e1d

                            SHA512

                            5584bbd1241771af1ba51f270248521e60d519a565e1d31ed2efd9ac04f67e0bc5973a97e459ac1a2805c126b696ba4b00c0309a47639a2fe6845506bc88526b

                          • C:\Windows\{7723DDE4-5156-48d9-8DE3-644B8106BCAE}.exe

                            Filesize

                            372KB

                            MD5

                            1be41b55cea095632e27434dae194050

                            SHA1

                            20362330b78edd6ff8ba3401bb7167cf2fcd5bb8

                            SHA256

                            6f940d0e835d0c117e67799f26d5f838f38a7c1041ff7f420b51b438d01b0a47

                            SHA512

                            e00a4d31985b61ffda5527626bc7eb34648269064dea45e957110399b0f186e00c8f34d4c0bf4edaec48c2aa293880c70cc7c4358573b51b4a2c247c78681738

                          • C:\Windows\{87F03662-DDF5-4639-A2A7-0A9FC6EA664D}.exe

                            Filesize

                            372KB

                            MD5

                            b182c49c23c6ca7d8408963f78de0f41

                            SHA1

                            59da8aea5a8ef00dc264136278ef2c2df36da587

                            SHA256

                            3f5d87e48eabb1aaa342b2d7236278631cdf5a41bdff9aea0e09a1694f3626db

                            SHA512

                            23a34218db532803784b084bbe740e67e7657ca278d8f7d789af5640ec57723bf4f16da06867c2e93d74500660a8b0f99e8872b3e6dce873e731a7f5818ca088

                          • C:\Windows\{AA7FD2D7-B970-4ddf-9EE3-1575B58FF1EC}.exe

                            Filesize

                            372KB

                            MD5

                            448dd43617241e9e26de329c23be2618

                            SHA1

                            0ae46e2f304ce7317ff09fec286692c04b299004

                            SHA256

                            2623465936dc8e846ac8e30ec7b3a8310743d4d066cd2f2736c6260d2a2a078b

                            SHA512

                            44c46f7ec80040d132df92ffcfef60feb4006b65865dec78f098f9c3f8751adb75ad3ecefe1e162de1203a54e06d21c509583706da220b7a643e3e8f4391ccb1

                          • C:\Windows\{C3D69ABD-583A-4012-943E-F440422B6CAA}.exe

                            Filesize

                            372KB

                            MD5

                            77e799fb207ca2d74843c8f8838f0a81

                            SHA1

                            71b473d7c3ef09563588ccf15013b3d84e50b0c4

                            SHA256

                            67016cfe444d1f0e23904b77e9fcd29bcbfa427141ac8ddfe151419e9abbcb24

                            SHA512

                            54d53e339a7ddc4b216f38e26ca0c936d5d78487e6e4d0fde112894a7637d0b8ced4736b1ab850dcb82663c7c7e681260f7c9028f7b0beca2cecb6a6d65d6e5f

                          • C:\Windows\{E1FA8B43-4DBE-43d4-8EBD-E1195BD9FE1B}.exe

                            Filesize

                            372KB

                            MD5

                            574dfe56656db3c76f700ee2ab8801e4

                            SHA1

                            6f419267f1a39451757626f6770617e52043c223

                            SHA256

                            8b2cc93e57859ca5b115ed34eb991b421332b00e9ccf1f49c9aa12d587450c15

                            SHA512

                            f568cd3438a26ec370a292e13b69cc07325156c44c7fee57c5c375ab33269a8b13e7a42a483e0660f854fa46fb072736f8cb413690fc0cce12a77b57897bf766