Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 12:24

General

  • Target

    2024-06-11_07f5b0e454e04d3818d62a1c20854ebf_goldeneye.exe

  • Size

    380KB

  • MD5

    07f5b0e454e04d3818d62a1c20854ebf

  • SHA1

    fbde11c70e7d670e1fecc8eefd1aeae97cdb0fb2

  • SHA256

    49fac542510ca9786014f13c0f7a11ca9e295902cdcadeeef4941460b9e81f35

  • SHA512

    5b01e369f92225dc85b470e28728cc0e152316d1ec61cec3b9da64d42bdc4b307e4bc8b761e01280547ac76ec52d08580a03f4ac23cae17502a5a3f5f491fc20

  • SSDEEP

    3072:mEGh0oRZlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEct:mEGNl7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_07f5b0e454e04d3818d62a1c20854ebf_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-11_07f5b0e454e04d3818d62a1c20854ebf_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\{ACEF3922-40AB-4098-8F5A-F11E6037759C}.exe
      C:\Windows\{ACEF3922-40AB-4098-8F5A-F11E6037759C}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\{0E3E1D97-1804-4b62-9563-854733D6F192}.exe
        C:\Windows\{0E3E1D97-1804-4b62-9563-854733D6F192}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Windows\{BE07B5ED-4655-4db0-A12E-9E84860EA20F}.exe
          C:\Windows\{BE07B5ED-4655-4db0-A12E-9E84860EA20F}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\{8A5DCF57-B9D8-4d36-8FDC-82398D40366C}.exe
            C:\Windows\{8A5DCF57-B9D8-4d36-8FDC-82398D40366C}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2316
            • C:\Windows\{374FE4FF-EB08-4c8b-B72E-AAA9B82AA544}.exe
              C:\Windows\{374FE4FF-EB08-4c8b-B72E-AAA9B82AA544}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\{3B36F428-61FD-4bcb-9978-28E3057544BE}.exe
                C:\Windows\{3B36F428-61FD-4bcb-9978-28E3057544BE}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1736
                • C:\Windows\{97520EC3-17DA-4e95-B8F3-44D75D197540}.exe
                  C:\Windows\{97520EC3-17DA-4e95-B8F3-44D75D197540}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2304
                  • C:\Windows\{BF6743FA-2911-4da1-8D07-4109F104B026}.exe
                    C:\Windows\{BF6743FA-2911-4da1-8D07-4109F104B026}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2028
                    • C:\Windows\{C0D4B7C6-58C9-4bea-87C2-D9C64EC702AA}.exe
                      C:\Windows\{C0D4B7C6-58C9-4bea-87C2-D9C64EC702AA}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1892
                      • C:\Windows\{16324CA4-3D94-4a89-BD40-8A72B43401CB}.exe
                        C:\Windows\{16324CA4-3D94-4a89-BD40-8A72B43401CB}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1508
                        • C:\Windows\{500967FF-1AF2-4007-85AB-03031B0A8F81}.exe
                          C:\Windows\{500967FF-1AF2-4007-85AB-03031B0A8F81}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{16324~1.EXE > nul
                          12⤵
                            PID:1716
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C0D4B~1.EXE > nul
                          11⤵
                            PID:668
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BF674~1.EXE > nul
                          10⤵
                            PID:2916
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{97520~1.EXE > nul
                          9⤵
                            PID:2044
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3B36F~1.EXE > nul
                          8⤵
                            PID:1020
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{374FE~1.EXE > nul
                          7⤵
                            PID:1620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8A5DC~1.EXE > nul
                          6⤵
                            PID:2860
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BE07B~1.EXE > nul
                          5⤵
                            PID:1228
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0E3E1~1.EXE > nul
                          4⤵
                            PID:2700
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{ACEF3~1.EXE > nul
                          3⤵
                            PID:2992
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2968

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0E3E1D97-1804-4b62-9563-854733D6F192}.exe

                        Filesize

                        380KB

                        MD5

                        1e1eb819609a1f8a0195d3920534bcbd

                        SHA1

                        464327195a81064f0f4cd6f53f98eaf54e4654a7

                        SHA256

                        b02760f2c5ba0e75e818dd48f17a2da20fcafe6ca37c2628f891df3e7267af78

                        SHA512

                        05349a70ff29752afabaf3df7875f689066f53cf5c4cab5e8d78fd6dafdfad8e77162c1f11c0a088ccaaca8bf21b47215b092941ef51fd01999f00b4a2a7516e

                      • C:\Windows\{16324CA4-3D94-4a89-BD40-8A72B43401CB}.exe

                        Filesize

                        380KB

                        MD5

                        1d9d6943b2f1c20a5c159ca952d770ed

                        SHA1

                        17209384c0a4e792af3cb903ded8d4fb03205fca

                        SHA256

                        8927cb22c0dd0eca2c620b3dc1d92416e3442037a80d53cf2afc2992eaf00e80

                        SHA512

                        86e39bce580a6a095dfd6f0621070144cd218956936ac747b3c55a00b27e191b3839487f6f4f90e14ed3205590b34bfd096a4ce27894d9967e2eacb292a5333f

                      • C:\Windows\{374FE4FF-EB08-4c8b-B72E-AAA9B82AA544}.exe

                        Filesize

                        380KB

                        MD5

                        3b5645a34f504ada5d44ac3865536eed

                        SHA1

                        6d16835f15135607849ce3c933cb46b55165347c

                        SHA256

                        60cc5635bdaf94be1d9db4820c6cdc9d714450dd45c692b007a01a338e9749dd

                        SHA512

                        71b188161288a285edc0bbab9aa52cb65fdb6e15bb8feb185201f162342d273a17ba158e6cca4b02a9f7ccb0cde2746ff622779bc48f21db10c95eb36ce94fc1

                      • C:\Windows\{3B36F428-61FD-4bcb-9978-28E3057544BE}.exe

                        Filesize

                        380KB

                        MD5

                        0949a499ee85437f3df191c93dc1691b

                        SHA1

                        c7344261fd833b2e68c3ea75bebbfdc78c4e42f2

                        SHA256

                        d76bda51579c9c92058c029ef3757b232032d5835887ddedcd1d97cac6790794

                        SHA512

                        c87aa43d438d6ebd244223296d37f7c407262b4144e1f25522ca6da8fcd1fc0a2c899a0efc12c74cccbcd655ed0b78277362c1e414c14b6ef728284ec06b4df7

                      • C:\Windows\{500967FF-1AF2-4007-85AB-03031B0A8F81}.exe

                        Filesize

                        380KB

                        MD5

                        0a02557ab15a401e4b492008806562ec

                        SHA1

                        5afeca75310479d1bf5a4df3ded38960b4a86201

                        SHA256

                        5d4933338a4bc1f87f104ce69a678b38298c3164dc99172d43f0d0ba1123f19f

                        SHA512

                        84735638181f87e9f539673c678419fa68088b4896f0989f74698a85e6dd445639bc476e73e857e69e43e0312880f925ba27c9403bde577ec07829e6ec8eda11

                      • C:\Windows\{8A5DCF57-B9D8-4d36-8FDC-82398D40366C}.exe

                        Filesize

                        380KB

                        MD5

                        0fa5f1369bec64bee2448e41ab2205d6

                        SHA1

                        dec7fa9ac54494beadd32efcda39715b9bff9f7d

                        SHA256

                        d7753aa4f640bd65d95633742cc183deaaffc003327a2e56b70d3379bc9b640c

                        SHA512

                        f0ecb8a26ff22264c790c62ca34a474549af1fb161b604700e2f55a38069a9dd05ef1cc4d2c8363aedd9a2fd825c5d8cca0389ed7a2ab85b3b563886e0eac797

                      • C:\Windows\{97520EC3-17DA-4e95-B8F3-44D75D197540}.exe

                        Filesize

                        380KB

                        MD5

                        34c470076f2c08301bfb099fc7a85036

                        SHA1

                        057051fac51d8fdbb32e614ba1c8209c056cdb54

                        SHA256

                        9cc35675afc9827c8f5044640aad22b2cf2b7eb74e6a45754594e304d8fb30a8

                        SHA512

                        ab48885fe49a9c9b41f7659f3104bcd1d601e1e7f13c6b642efa78a5ccff9a7a7713950a2819ca20aaf4b02e2fdbd4e4898d141f860167d4dee813cc4c779136

                      • C:\Windows\{ACEF3922-40AB-4098-8F5A-F11E6037759C}.exe

                        Filesize

                        380KB

                        MD5

                        3d423f2c45bfd0dc36ea8b6b76d3a336

                        SHA1

                        6c7fe5494e5630666136ff80d7af2841fff732ec

                        SHA256

                        18216165bb93cd9aacbcc62d558dcce12ed8f45d2c2a9c3af944b9bc12efd1ed

                        SHA512

                        3d9dcfa03288bf14efc653b42925534325f2c075d310562a7fae5dc4e781c69486e4113c8d70b5bf1d8c7ba551edf796bf11b2e77b3fd08474d83b3081988507

                      • C:\Windows\{BE07B5ED-4655-4db0-A12E-9E84860EA20F}.exe

                        Filesize

                        380KB

                        MD5

                        47375e70b97cc03844c08559706d25bb

                        SHA1

                        29f6be7d0630bd74bee313cb26764a33d48a3672

                        SHA256

                        29e57601e1978b9789e9a5d85008f2933ef6345bf24142be9b8ce5b2e6f26128

                        SHA512

                        9fe6b935aa3b3831ce998acaf8cfb3a82edc46cb19d70aafd2fc34794e9f0db42eebee429b26cd659507c95e77fb2ecb05c55bd0b8e16597e297985b13fa6312

                      • C:\Windows\{BF6743FA-2911-4da1-8D07-4109F104B026}.exe

                        Filesize

                        380KB

                        MD5

                        d744adb61ee6ab9b254c5f0e2ad2e690

                        SHA1

                        18cbc53777e93190bcb021a71bb7d1bd95d1793d

                        SHA256

                        b785b618a7b8fd70cb24c7aac3b373df7c1ef84135d4578c6656cacc831ac713

                        SHA512

                        8f0e2bd7d57f6f00f0c8399166a9b04e2e33ce5083e6078c71910b2f0becab788dac0850810d56312abfe1c663283419d1884526ec7d9f751c7ac0c8d90c4f64

                      • C:\Windows\{C0D4B7C6-58C9-4bea-87C2-D9C64EC702AA}.exe

                        Filesize

                        380KB

                        MD5

                        bf959ac9c3c4a8fd2b48062ddb9b3ab9

                        SHA1

                        a3c7f7ecd06045c89fb1630fd9d4afa1c7d25930

                        SHA256

                        8126b74354ab58c8596bbee4ffd9c451ba629a05fbb138e525e2c7f7f1dd272d

                        SHA512

                        8b6a007bcc4daee470dafb435346d9d39ccd2456ec7ac6206740cff4feadfbda762a495742bb20d63d0284a3952fdf8d6e2f66256c7c91d0bbe7fe8a7881fe1c