Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 11:47

General

  • Target

    2024-06-12_63491eda1deeecab79878ac00a7cdd2b_goldeneye.exe

  • Size

    408KB

  • MD5

    63491eda1deeecab79878ac00a7cdd2b

  • SHA1

    b1c660e932b753248763d9a20d32cfa703c432e3

  • SHA256

    acfc29b2d6b8d6d0d796db1fa0f07c46133aa670b0fa313f91708ee8e611125d

  • SHA512

    6449c23e7307785f5ec6345616a112ee46203a30f97c82dabf1451990c4749a922df7d8575ae3d9ecb90b64666c1d43ba76ec1204f44cd8f313047c839286df7

  • SSDEEP

    3072:CEGh0ofl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGNldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-12_63491eda1deeecab79878ac00a7cdd2b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-12_63491eda1deeecab79878ac00a7cdd2b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Windows\{AD5C945F-07A9-4be2-88D4-57CE7CB72715}.exe
      C:\Windows\{AD5C945F-07A9-4be2-88D4-57CE7CB72715}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Windows\{8E180042-2E9F-4bbc-90E5-4E2AEAA69665}.exe
        C:\Windows\{8E180042-2E9F-4bbc-90E5-4E2AEAA69665}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\{2AA7EBB7-08B6-4907-B578-27D98D40E0D0}.exe
          C:\Windows\{2AA7EBB7-08B6-4907-B578-27D98D40E0D0}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3184
          • C:\Windows\{C4BC4084-339C-4247-A7DE-9A4EF5E4F5F8}.exe
            C:\Windows\{C4BC4084-339C-4247-A7DE-9A4EF5E4F5F8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4928
            • C:\Windows\{F2E8FAE6-2093-42e3-889C-DBC60BDE6CB9}.exe
              C:\Windows\{F2E8FAE6-2093-42e3-889C-DBC60BDE6CB9}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1088
              • C:\Windows\{09EC078C-EF91-4912-AADB-7F50F3E026EA}.exe
                C:\Windows\{09EC078C-EF91-4912-AADB-7F50F3E026EA}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5044
                • C:\Windows\{C4F38DBB-44BE-4d76-BD26-6F140B33B5F5}.exe
                  C:\Windows\{C4F38DBB-44BE-4d76-BD26-6F140B33B5F5}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1488
                  • C:\Windows\{F21910DE-B9A0-40f7-86FC-566471562480}.exe
                    C:\Windows\{F21910DE-B9A0-40f7-86FC-566471562480}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:604
                    • C:\Windows\{14C261FD-75D1-4034-BC5D-88C2C9D01A60}.exe
                      C:\Windows\{14C261FD-75D1-4034-BC5D-88C2C9D01A60}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:644
                      • C:\Windows\{0D7C9884-C394-40b4-9029-039CCE10F12B}.exe
                        C:\Windows\{0D7C9884-C394-40b4-9029-039CCE10F12B}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2028
                        • C:\Windows\{3EB5BAF8-BE27-40fc-A58B-FDA96F040EF4}.exe
                          C:\Windows\{3EB5BAF8-BE27-40fc-A58B-FDA96F040EF4}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2252
                          • C:\Windows\{23CDAA3F-D0E6-4ff9-BF94-007771583F92}.exe
                            C:\Windows\{23CDAA3F-D0E6-4ff9-BF94-007771583F92}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:2008
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3EB5B~1.EXE > nul
                            13⤵
                              PID:1916
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0D7C9~1.EXE > nul
                            12⤵
                              PID:4224
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{14C26~1.EXE > nul
                            11⤵
                              PID:2604
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F2191~1.EXE > nul
                            10⤵
                              PID:512
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C4F38~1.EXE > nul
                            9⤵
                              PID:1876
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{09EC0~1.EXE > nul
                            8⤵
                              PID:4400
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F2E8F~1.EXE > nul
                            7⤵
                              PID:3148
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C4BC4~1.EXE > nul
                            6⤵
                              PID:4076
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2AA7E~1.EXE > nul
                            5⤵
                              PID:8
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8E180~1.EXE > nul
                            4⤵
                              PID:4804
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AD5C9~1.EXE > nul
                            3⤵
                              PID:5104
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4532

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{09EC078C-EF91-4912-AADB-7F50F3E026EA}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  22a80fda2934bd6dcdf6250596207f06

                                  SHA1

                                  50af18589b07643a2642ff7a693fe6afbdfecdd5

                                  SHA256

                                  c0d100c1eefd5039eb790f2e0fd6fc18814edd55f601249a08d7e8b7c09b2a3d

                                  SHA512

                                  762b894d691d1cd41bb612aa3888a9efdf3331aa85863cd00e00363b6132a835bfd2197aaa491dcbdb30b5248cf8ef2ddfd3b2a71cdab0802abd970ed1e5388c

                                • C:\Windows\{0D7C9884-C394-40b4-9029-039CCE10F12B}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  f5012b99e74da4d150e130bab459c49d

                                  SHA1

                                  1f1eae1d4700cac7fb8471f8f0c0c602544712c9

                                  SHA256

                                  bd9163dc9f5c649956dcf686e427a8bce093610650f22e64fc4a252b3de88c50

                                  SHA512

                                  cde90ec803ceed7b9a0a6b3441b35f9dfb781da73019fd864ddfc1b48e1655bc8667542528dac7857610e8e581bf174b23f5029fc76939bfc26fec50823a0788

                                • C:\Windows\{14C261FD-75D1-4034-BC5D-88C2C9D01A60}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  64bc3060e35afd9b3660e4f639e63a41

                                  SHA1

                                  bfedb429cdd6d3f3f6d53e55e1fd6d75ef3a0e31

                                  SHA256

                                  00fda3e1478679239c8918cbe71c6c9d32c6fa559501d5cab3f9ca3958cd21c5

                                  SHA512

                                  cc9ed939863cc5f90bd4358b90a3f67d3eede45ba43d2c5d5fa6a92beef4c59bf6ff3396e71e171bec4d5e673daabdc29722c79d8f216b0299229f66124192e2

                                • C:\Windows\{23CDAA3F-D0E6-4ff9-BF94-007771583F92}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  4ec1e93579b321e50dbfc692c7ee68ff

                                  SHA1

                                  c82847386cc6f2981fee98d06b09013e117b80db

                                  SHA256

                                  1ca3e9991266f115e206465bc3fe6cd00c85cacf0d6d9e36a1b1610ca4230c5a

                                  SHA512

                                  f56f7a49b6e6dcc7201027c01a2973ea6529ecffe11427ace032bc08bcd5d2ea1898d76971e39d9e05128d3e8e3c0b308bcbb1a375ee7f3db06b2a1d97e7e5c8

                                • C:\Windows\{2AA7EBB7-08B6-4907-B578-27D98D40E0D0}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  ce2ae7b7bbf4326f8ca55970dbe5429e

                                  SHA1

                                  90b3e8f0e236829b40719db532c2d827344bd0ea

                                  SHA256

                                  3a0f6b383655b76fe130d08eb3e5ba75d64b9c207cdd2620febb96c4cf8b4ef0

                                  SHA512

                                  ad801cbe409ceccaf6697358b70ee922624d804c0468f5214c3bb2d6b2c9f6e11deacc0da789bcddb817a5af6ae5ed898ed822a76c525cecc6063a614c0156dc

                                • C:\Windows\{3EB5BAF8-BE27-40fc-A58B-FDA96F040EF4}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  d28c221e1ff8e3ce05fa41500bd9f427

                                  SHA1

                                  0b2a5c3c911ff1e83ced7e6b2080159c9bec631d

                                  SHA256

                                  bbd900a21bd71f9625848096d80ddbfc7608bf4dc72a13435a5fcd8a67399df5

                                  SHA512

                                  2360a7205411b1015a88cd38da781e43bc12abe96215faa90d3783fc71ec048b79deef3b9c090fc09fb41c558e8af3ab322837738cd36f5d5f4ce675d2b87cda

                                • C:\Windows\{8E180042-2E9F-4bbc-90E5-4E2AEAA69665}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  d69865324475e70602a31e10f91a0b39

                                  SHA1

                                  b56aaa02c94bd35ac93de5b2fe607b3995512333

                                  SHA256

                                  e18ee601f47bbede4cf185389e3deda4ce5bba1333b190d19d4c858999cc9e48

                                  SHA512

                                  8cd9aff5d59b4cb93ae791c31f12e7e1e54f95b63616ca3e0dfe765542710403675873f9d1123b769f111f1d746b063039f2d91a3e0f1f7490ac993137da90db

                                • C:\Windows\{AD5C945F-07A9-4be2-88D4-57CE7CB72715}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  31dd153ba32db310b36b4aa0c924ebd7

                                  SHA1

                                  b70b723b270937c7260adf6a92d8f59d4ff0a83f

                                  SHA256

                                  49c98447e955e91a7fde4a440ca0b384d1ebe5288b8eaaf3368f6dfd057594ec

                                  SHA512

                                  b3b1039ce0f392495f4479072f6e8be328b179a092ed27303e4dc841de80a01f35fc181046082296bc2bbb692a6bc080432b34ee76088480f338dc45665bdee2

                                • C:\Windows\{C4BC4084-339C-4247-A7DE-9A4EF5E4F5F8}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  02b63702f56d1b54db8a3c5a3c5219cc

                                  SHA1

                                  51b59e0e201a5c4bc4c235e45c276aa2b724be46

                                  SHA256

                                  be77a21e647a9fc9066b0de11e2f9477552658297b08360d483c706744627d6a

                                  SHA512

                                  08b6d0be37529b2c027e9c2a9eb4e76234104cdbb5d4f5c61da422e3b32cff9131dcc3e5e94697a8fb320aedc1db3726d5d0cb3a003c38e0550353f490aed63f

                                • C:\Windows\{C4F38DBB-44BE-4d76-BD26-6F140B33B5F5}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  247be0110d9efccafc9964053d38fd8c

                                  SHA1

                                  0564df1be274f2794a26f7507bf07138d4c4983b

                                  SHA256

                                  3e9844c4098e7c6643e08625c580c8bc656fa24f584a07844396383bb0d9f061

                                  SHA512

                                  a220b8a2f408e640bb8325b35f1b69a8050b19eae4ac15c798d998fdf9af5625069292e39502b5ca99f1b89bd37d2959601488a6f50fe44af539fae045593179

                                • C:\Windows\{F21910DE-B9A0-40f7-86FC-566471562480}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  3e72f20d50970f5ef700dffc8d638dbb

                                  SHA1

                                  950c8b7d01472bba316bb3ebbb05a5e97d4dee27

                                  SHA256

                                  4d440a736d88a0babae0a81dc1284add6bcc782a17690cc89150f01e2260dfdb

                                  SHA512

                                  8af22507207620c103644523a80b9c7c40baf20892cdc372f8deed85237cd7148c0d7367e7a68457721ab7cce92477dc60ea639cf181cdf273ec8ac7e90c9a0c

                                • C:\Windows\{F2E8FAE6-2093-42e3-889C-DBC60BDE6CB9}.exe

                                  Filesize

                                  408KB

                                  MD5

                                  5835129d863a974460cdfc40480a8d19

                                  SHA1

                                  3503e380fa57b227136c090f09f764f0315e42e6

                                  SHA256

                                  d94215b7dfea45bf1182798f6fb37f7ecbfec49e66d008f4be28bb2ad9025d8f

                                  SHA512

                                  088263456312ab44d19a2452680dbc3a7540a03d0b41bc5a0c3c57346356e4529ad34c877a34d6ba7c5ea29627998360672b8cd96a868e6f72956d14e21856ac