Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 04:19

General

  • Target

    2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe

  • Size

    180KB

  • MD5

    f3741bca08a664227f2437f039d7dd2c

  • SHA1

    5c5e4b7d12fd0eca38003009060469747874cc63

  • SHA256

    e7f44ca2e2b667c4028c7b783dbbe402b768051eab6396318f057cfd7d6f0360

  • SHA512

    6fb6741c34d2ce0bb26c2fff13d8877f7936fcfa752f7e6039373ff4c076658bb5a1358c5d9ffa603511832a3ebc4d921afaf4bb667613fee93f61146d11c95b

  • SSDEEP

    3072:jEGh0orlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG9l5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-07_f3741bca08a664227f2437f039d7dd2c_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\{C684CEDA-1764-4998-B932-5210022232C9}.exe
      C:\Windows\{C684CEDA-1764-4998-B932-5210022232C9}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\{4C635363-8BA2-4890-90CB-EBB5B85367B4}.exe
        C:\Windows\{4C635363-8BA2-4890-90CB-EBB5B85367B4}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\{46BFDD8D-BE64-4963-A645-FEA9A0B08CDD}.exe
          C:\Windows\{46BFDD8D-BE64-4963-A645-FEA9A0B08CDD}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\Windows\{98C97121-056D-487d-A6A7-49FD0487C147}.exe
            C:\Windows\{98C97121-056D-487d-A6A7-49FD0487C147}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4312
            • C:\Windows\{2712D95D-9365-42c8-9BE1-754184595D2A}.exe
              C:\Windows\{2712D95D-9365-42c8-9BE1-754184595D2A}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3516
              • C:\Windows\{1B7471BF-D03B-4d69-8345-37487F36107B}.exe
                C:\Windows\{1B7471BF-D03B-4d69-8345-37487F36107B}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3396
                • C:\Windows\{BC561C15-2A37-4571-9316-E3BD17767CFC}.exe
                  C:\Windows\{BC561C15-2A37-4571-9316-E3BD17767CFC}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1996
                  • C:\Windows\{533CDE1B-8567-439a-ABE7-37C50BFEFAAB}.exe
                    C:\Windows\{533CDE1B-8567-439a-ABE7-37C50BFEFAAB}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1560
                    • C:\Windows\{00539CEE-F1E3-4d97-A8C0-75C2A61BB438}.exe
                      C:\Windows\{00539CEE-F1E3-4d97-A8C0-75C2A61BB438}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2436
                      • C:\Windows\{8DC95A31-2E7F-46c9-80FE-EEA15C037343}.exe
                        C:\Windows\{8DC95A31-2E7F-46c9-80FE-EEA15C037343}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1440
                        • C:\Windows\{A9CFDCAF-B321-48f4-898A-90CEDA1F3968}.exe
                          C:\Windows\{A9CFDCAF-B321-48f4-898A-90CEDA1F3968}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1688
                          • C:\Windows\{170EA1E2-4FAC-4bbb-AE78-4DBC324A8530}.exe
                            C:\Windows\{170EA1E2-4FAC-4bbb-AE78-4DBC324A8530}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:5104
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A9CFD~1.EXE > nul
                            13⤵
                              PID:3808
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8DC95~1.EXE > nul
                            12⤵
                              PID:4188
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{00539~1.EXE > nul
                            11⤵
                              PID:3980
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{533CD~1.EXE > nul
                            10⤵
                              PID:4144
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BC561~1.EXE > nul
                            9⤵
                              PID:3360
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1B747~1.EXE > nul
                            8⤵
                              PID:3020
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2712D~1.EXE > nul
                            7⤵
                              PID:4708
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{98C97~1.EXE > nul
                            6⤵
                              PID:3672
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{46BFD~1.EXE > nul
                            5⤵
                              PID:4524
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4C635~1.EXE > nul
                            4⤵
                              PID:2876
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C684C~1.EXE > nul
                            3⤵
                              PID:2040
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2368

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{00539CEE-F1E3-4d97-A8C0-75C2A61BB438}.exe

                            Filesize

                            180KB

                            MD5

                            914de74b581b473b965dabf3d2f931db

                            SHA1

                            dbd8c1d67f7e2aa4611ab8f58258e725781b1e00

                            SHA256

                            f9357bdfa1daca6954544f986b3f97a52baeb3d7d1d99a5f0021eb4e7fd45a38

                            SHA512

                            ae8d207d9a85821cf80d56653a7a6d856f09536a4af556fbbb0f779b215232d0071a749021350373997c24ea20dda911d907b2587dd15b74c2fc5a346374630e

                          • C:\Windows\{170EA1E2-4FAC-4bbb-AE78-4DBC324A8530}.exe

                            Filesize

                            180KB

                            MD5

                            3d736a0dbce13260ed7d8c02297355df

                            SHA1

                            c0885fc33bbe101cbe9863637cf31dd8bc44eef0

                            SHA256

                            863cbec3767ce5d507b52791e766633d4ec9e8b5a32f258049d400302cff67ed

                            SHA512

                            afaf02031424af1a970bca507f1b52765cf95ecfa287b08fca564f92dd05198b946a60801bf4492f4cee576da81c689c5e668f28e45de2a524cfc13722d6106a

                          • C:\Windows\{1B7471BF-D03B-4d69-8345-37487F36107B}.exe

                            Filesize

                            180KB

                            MD5

                            d8cf55dfa98f87dd78d9bc3ad9296a01

                            SHA1

                            ae467f359e6ad283ad738d0a7c78973eae1ff848

                            SHA256

                            3c8aaa51406d67f4eae5f0a4b891b3ad6bc8c733b4ad16669385ae1cbacd0938

                            SHA512

                            227beb4540a3b38cb5b5a951ce513ebef40ed1a80151a69ecd7f295160b4a64df92cc630afeb5a51010d61cae000e4728a075086577c010686faecfdbc6e8580

                          • C:\Windows\{2712D95D-9365-42c8-9BE1-754184595D2A}.exe

                            Filesize

                            180KB

                            MD5

                            a3d9f1e3e20cc0d86082846ebb9de2eb

                            SHA1

                            4638414b6bef1a71c5009555592f394d907f370b

                            SHA256

                            edf7288d19de0ef8bfecefa7d885011fcf0b03177f54171fe45c4513c0b003a0

                            SHA512

                            ef80ac86aaa154fb98d267fcfe5ecb8d0d11f0f07f841830500ad97c7e9ccedff2064503f377bb798fd577bff5e6f56828b097eb2fd32219c38402729af6c39f

                          • C:\Windows\{46BFDD8D-BE64-4963-A645-FEA9A0B08CDD}.exe

                            Filesize

                            180KB

                            MD5

                            21e000a647f7cc446c579a43c5cd519c

                            SHA1

                            bbe6271bb0541096559f32bbe813aa82f21e99f2

                            SHA256

                            3c9fecb24f78ba29aee0e598b59d79fbf79d5b49f2ff26306035959cfbaf4251

                            SHA512

                            c4fe28c0c148d3540182e64d1c28f667aaf320665607aded6ca08f8ca7127d2e43b9f6c0600dcf6a70f2920e3ab8193415ae1258967807cf245789c53a7dd263

                          • C:\Windows\{4C635363-8BA2-4890-90CB-EBB5B85367B4}.exe

                            Filesize

                            180KB

                            MD5

                            871a81fe151bbcbe5a879c10aee4b393

                            SHA1

                            aeca1155b1b182265264ee8ac226699de5726559

                            SHA256

                            c1efb9e9aaefa72818540e4706925d8d8a08eb36ab580009554b1d5be4bc909c

                            SHA512

                            656f97b3501a53844d667571b310a30e74397cb189432e5a7b3e0a0bacf2870337ee9185ba2688f503c557b9d75442aa0d0553d179cb8b850d39af72f7852337

                          • C:\Windows\{533CDE1B-8567-439a-ABE7-37C50BFEFAAB}.exe

                            Filesize

                            180KB

                            MD5

                            bdacda30840ab194054c60405a25b72b

                            SHA1

                            f47fdb1b5b8248121e565dee187c024577020682

                            SHA256

                            422d9d0da230c99aa53f5b641f92fc29149fcbca34e7bf6c6191c6d34d806917

                            SHA512

                            99d0b1993b54f2ed75a6a09d8b3c6f6871c890cf31facfba5880401cf1a9df154ffd3279c776f774952f907f4955b129c6f9b04e6091281b05f509c07fd81a88

                          • C:\Windows\{8DC95A31-2E7F-46c9-80FE-EEA15C037343}.exe

                            Filesize

                            180KB

                            MD5

                            9aa5731da1e1f52ffd9f6da3bad477fa

                            SHA1

                            e840d0a9ec423be3559e0b470dca2fc122d2f462

                            SHA256

                            efbd8cc503a0d2d27bf57cdb9d08380598feb55b3db6aa57946d8304019a8e84

                            SHA512

                            a516a450f12298500bc66b4f7113e5b5038053854bed6818f7a51518d5e966ddf3809db1a8a8b386ae6cc7ff496428af3848a47de2923cfd48222959d8ce1c2c

                          • C:\Windows\{98C97121-056D-487d-A6A7-49FD0487C147}.exe

                            Filesize

                            180KB

                            MD5

                            e272dd36d155b12e8057f64842a28cba

                            SHA1

                            e55bd74142e306242f92b7dc7fdd712724fd7c82

                            SHA256

                            265821da2138d9e4e4d4523831f2f24a290c2a4c6bb9f897eda55146219d2c9c

                            SHA512

                            194c0ed9d92e3a0e8a1bae125eb11cbb62d76b45e08f45345be4678ae131849968ae08588f766a42013241654470b634fb6e8f147da562ce97a30370e83e8b75

                          • C:\Windows\{A9CFDCAF-B321-48f4-898A-90CEDA1F3968}.exe

                            Filesize

                            180KB

                            MD5

                            6bede1468106810f7dc390dd12e9f988

                            SHA1

                            560ebd53b726a8906dd167aa87fd370aed7b93a3

                            SHA256

                            05f83c2d16517ad8bd113cfae89feeee2f6da75751099c40a27981eab196cb12

                            SHA512

                            4012ae090a3d88cc3733f1548ed5b43bbc0615dcb2e246fc1830b2053d233b8d520a322e591aeb2cfe77d65c5789137065f3e2410aa29d8df15f4afd26b14d46

                          • C:\Windows\{BC561C15-2A37-4571-9316-E3BD17767CFC}.exe

                            Filesize

                            180KB

                            MD5

                            7955ff06964de5666af0c406ccd5a199

                            SHA1

                            7bcf67be83226bfc5525ae61f944ef8096bc71ca

                            SHA256

                            ed8fc548658e559a41f09f31a8436f05a45b38a43005e7e38e587197f7d5723c

                            SHA512

                            1fcfcda2935b226ab40c7c666d2455201b26d56c5c0d46fc2f4c8deffdc559f34f1ec980080b124d0c73d56f0d6d97b83a23f45c869b8fb1a26c7418aa94167c

                          • C:\Windows\{C684CEDA-1764-4998-B932-5210022232C9}.exe

                            Filesize

                            180KB

                            MD5

                            72e4c58b15af9b3a18e2876aa1cb8aee

                            SHA1

                            c0111bfc6fa2e3c283371b580b8b3535d13cad4f

                            SHA256

                            3b6f1238473651075c6cbee44539d3d9dee588988d7d72772234d162bd7727cc

                            SHA512

                            2b74818e11b714fa7ac2295a77d8634347eedb9ecd2a97edb0eb76fa3a5fbbb8c9fdcd2307d848b6dd535ffa19320d6f6ed5219e0bd4aae6c840de7a5ed78f5c