Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 10:57

General

  • Target

    2024-06-14_adfcd647fdda4ac0dd5ff34eb8fe3505_goldeneye.exe

  • Size

    408KB

  • MD5

    adfcd647fdda4ac0dd5ff34eb8fe3505

  • SHA1

    1409694f76fe7f132e7a60721593e1059b949cee

  • SHA256

    63f79f5dbb1e9ffa96d0824da6f1d2053f299e341287aabe4290edfad7443b88

  • SHA512

    5dc6402e0cdc1130e419c1966efce0f39ff66c2e89fe1a74890b743befb9bd99264e3a30210a8482b7a2b1d9ca920181fa28f2d01fd0b37c2c71e2891928121f

  • SSDEEP

    3072:CEGh0odl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG3ldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_adfcd647fdda4ac0dd5ff34eb8fe3505_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_adfcd647fdda4ac0dd5ff34eb8fe3505_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\{DD9E614D-58EB-4da6-A4A2-29E0A69961D0}.exe
      C:\Windows\{DD9E614D-58EB-4da6-A4A2-29E0A69961D0}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Windows\{7AD32861-75C0-47b0-966A-D8F1BE7034E7}.exe
        C:\Windows\{7AD32861-75C0-47b0-966A-D8F1BE7034E7}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\{B6856D3C-0E7D-434a-A8A9-1223028C7CA1}.exe
          C:\Windows\{B6856D3C-0E7D-434a-A8A9-1223028C7CA1}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3640
          • C:\Windows\{8ED814BE-B4E6-4b68-AFEA-2A47D9B79622}.exe
            C:\Windows\{8ED814BE-B4E6-4b68-AFEA-2A47D9B79622}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\{E91AA165-2423-4673-B1CC-ECCB8F0CE002}.exe
              C:\Windows\{E91AA165-2423-4673-B1CC-ECCB8F0CE002}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3876
              • C:\Windows\{BB4A1741-CA9A-4972-8D94-0865D71AD83A}.exe
                C:\Windows\{BB4A1741-CA9A-4972-8D94-0865D71AD83A}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4304
                • C:\Windows\{E4D68CDA-42C6-4ca5-BF12-39DF650DC207}.exe
                  C:\Windows\{E4D68CDA-42C6-4ca5-BF12-39DF650DC207}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2864
                  • C:\Windows\{C95B116E-A6D5-4215-B3FF-FB61EC18D750}.exe
                    C:\Windows\{C95B116E-A6D5-4215-B3FF-FB61EC18D750}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1576
                    • C:\Windows\{C729A304-9240-468f-89A2-ADE3940372A7}.exe
                      C:\Windows\{C729A304-9240-468f-89A2-ADE3940372A7}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1800
                      • C:\Windows\{AFA013EE-8CEA-4f01-8D76-6FE6A69883EB}.exe
                        C:\Windows\{AFA013EE-8CEA-4f01-8D76-6FE6A69883EB}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3336
                        • C:\Windows\{FF8BF137-5707-4c21-A770-A3D756B3D580}.exe
                          C:\Windows\{FF8BF137-5707-4c21-A770-A3D756B3D580}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1380
                          • C:\Windows\{0E848F47-22B4-4d24-A38A-5F508878CC90}.exe
                            C:\Windows\{0E848F47-22B4-4d24-A38A-5F508878CC90}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:4500
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FF8BF~1.EXE > nul
                            13⤵
                              PID:4736
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AFA01~1.EXE > nul
                            12⤵
                              PID:2948
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C729A~1.EXE > nul
                            11⤵
                              PID:3228
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C95B1~1.EXE > nul
                            10⤵
                              PID:3480
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E4D68~1.EXE > nul
                            9⤵
                              PID:4268
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BB4A1~1.EXE > nul
                            8⤵
                              PID:2408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E91AA~1.EXE > nul
                            7⤵
                              PID:1168
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8ED81~1.EXE > nul
                            6⤵
                              PID:4884
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B6856~1.EXE > nul
                            5⤵
                              PID:2592
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7AD32~1.EXE > nul
                            4⤵
                              PID:436
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DD9E6~1.EXE > nul
                            3⤵
                              PID:620
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2276
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4120,i,3671441404766730751,12082497324212183132,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
                            1⤵
                              PID:2544

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{0E848F47-22B4-4d24-A38A-5F508878CC90}.exe

                              Filesize

                              408KB

                              MD5

                              bcb3c5d1117a22ebe5ecd70beb91e4ed

                              SHA1

                              918857a7ddbbf3a787d973bd2b68bcb8f57624c2

                              SHA256

                              9384468cb15d2d44db6517d98aab3e92e8a0c1a9f5050ff3c77749f7936e0835

                              SHA512

                              e96557ab3d56d84ce11bd0665750a3d6dd43d1bb1f543aba85241b4480694cb1e7175a46774d25e25a36244167068642892bef02566e781843856409b93d1eb4

                            • C:\Windows\{7AD32861-75C0-47b0-966A-D8F1BE7034E7}.exe

                              Filesize

                              408KB

                              MD5

                              3c1f36c1e0070c6e2971b1f27501e845

                              SHA1

                              c4f8f2bd9f220f4c117a2f49c5d96147a19aa751

                              SHA256

                              a43025eb57cde41b95e75cb34bdc06b3010a09e20e66dee3a1a46e18ddde2559

                              SHA512

                              b04c0810ce22cb395c1b46e0e596489902d9a4cfb4e70bb911038f40bbe81dc122b79668b87208e4e3ccd7c47dc6bb3873939ad505e910c238656ed894de4818

                            • C:\Windows\{8ED814BE-B4E6-4b68-AFEA-2A47D9B79622}.exe

                              Filesize

                              408KB

                              MD5

                              8f64522de9a8e87114e44aeea6950d86

                              SHA1

                              e7ef30bdef5f8ed981b3040d483ab9f5a313964a

                              SHA256

                              3697247cad8baae351742d64a11e2cca983b5953efecd1876e5f919a9a6395c6

                              SHA512

                              d62dbb4dddad033391c58ffa53b8717c0edc8ce86130b9b3c25b238d469c7b9a14f84d1a2f4341c6988c45e3cf9443cc938cdb46d567d4523b60c988c043085a

                            • C:\Windows\{AFA013EE-8CEA-4f01-8D76-6FE6A69883EB}.exe

                              Filesize

                              408KB

                              MD5

                              c857e274b96f6265ead301b85f918ad8

                              SHA1

                              7688726f9f9491c96fbbf608ab2e2169390573ac

                              SHA256

                              895735200ce3cad0cae2acf18326a12d15104e1e871201f3bbe5b7c37c409493

                              SHA512

                              7d20a153af210355053228b9ad3fedb5d23befb9edea66761681b69fc66d166ffe1c950760f078a8363088f1d5022c5723acef7df2e9d95631a08f69ecfd56b1

                            • C:\Windows\{B6856D3C-0E7D-434a-A8A9-1223028C7CA1}.exe

                              Filesize

                              408KB

                              MD5

                              62d3a409fe86f133b5b0ae5fdcb524c9

                              SHA1

                              831004e6d0591629aa0048312c586a02a547515b

                              SHA256

                              be3ad07aabe5d33f9c0b1830956f4115ee2f643d31ff1d0b69add6cad53bd059

                              SHA512

                              b00f0c68da73d11d6f675fdc5891812e017fb92c325ef0d31c1ebaf9ea7f89ac975ce0a6bf6ed95766ff397016fd2c3d37414539c996d9aefec3c2730d78a977

                            • C:\Windows\{BB4A1741-CA9A-4972-8D94-0865D71AD83A}.exe

                              Filesize

                              408KB

                              MD5

                              0222c990cabf40fad526b9d13445db2e

                              SHA1

                              5ae7225bbb2fe8346f86c1d63695537d900294bd

                              SHA256

                              f3d4ac2d1ed222a6424e23e3165a1a3d7add6ac28b8fa1c48e77a12c60949ecf

                              SHA512

                              daa9dc5b29e3bab67cccd8e4bb712ae8d6558f5d5a5690f1adcfbf113cf1d87ddce7a806b7323a043d5e38bcf73465cb248d118822fd7dba14f97d16758b130f

                            • C:\Windows\{C729A304-9240-468f-89A2-ADE3940372A7}.exe

                              Filesize

                              408KB

                              MD5

                              c7f64400e65c82faaecbd12ef1bdd974

                              SHA1

                              a0453ae88c0e124862022879eb844ea84738c049

                              SHA256

                              20e1c6d25525d947179f5763cd37ba5d0378bc041e196b7d5e24b47bcc085600

                              SHA512

                              3d89ba9a5fc0f8db9d532266f6fd2e19f74f19c46fd7809880d54759eacc5b79026883f50f02b8aaa661ef8892ccd45c6723c7bd1ed46db5b81631855db5832c

                            • C:\Windows\{C95B116E-A6D5-4215-B3FF-FB61EC18D750}.exe

                              Filesize

                              408KB

                              MD5

                              ae72d613b01ff5893b79c64a747a22f4

                              SHA1

                              6ec087c1c6ed213ccf82bfea330c5c6af415dbbb

                              SHA256

                              1a753cd880e1914a6a526e7f2441dc6557f491edbfafda113838fc20e0026bcf

                              SHA512

                              37c57133b7491d9f5d70097546ae7c52cbefad8f19b87f289e491861162c51e1fb59da3089155773e0bab4b3a01f253aee60f408de9812126040c5f6b1ecbecd

                            • C:\Windows\{DD9E614D-58EB-4da6-A4A2-29E0A69961D0}.exe

                              Filesize

                              408KB

                              MD5

                              8df5b4e7bd94a1feca3b4da0832b98f7

                              SHA1

                              f5f50d992159aefe2b28f01d1fff0b922a917ea3

                              SHA256

                              d846840aad6455becbebfb5d16a0bdef3102777d84b9f971fc4d49407d7533a8

                              SHA512

                              ee5aaaa6cc7255b418a75b3af8dd263855fd8b87b5bf7a04b155eed2fa846a6b8b98f5c31ce8f4e8eb77b0486ac75f9de4061b79abf2ff975f6dad70d948ee4a

                            • C:\Windows\{E4D68CDA-42C6-4ca5-BF12-39DF650DC207}.exe

                              Filesize

                              408KB

                              MD5

                              c0608bbcc763f2eb207dc9f7c81ff640

                              SHA1

                              b0093589609fd1fc1d17e309b908d30d9c0dd454

                              SHA256

                              84e9c82024fa28b36d692c8c67c1cbf880c56ee485d9483698c610673ab211a5

                              SHA512

                              ad76909d3d868e97cda47a6f95af78e44cc205be7017a97bd653eeb39d2c1282046285a260d7fbf251ff98ae8503a50d4aa3a1fb781cf779b92adb908cec989d

                            • C:\Windows\{E91AA165-2423-4673-B1CC-ECCB8F0CE002}.exe

                              Filesize

                              408KB

                              MD5

                              6956ab61cf02b17ec8eeb8fb645fe092

                              SHA1

                              7d0f8c091cec872f180b77c5cf0f1415bc9bb18b

                              SHA256

                              839264d9fa294dd8be9a3a5bba86a9d9fbdb7fe1586c5885730d79e84c07749c

                              SHA512

                              f5bfead14a2628efff2a895fc49749ee894a013dab991995bc319d48110359812143c247a62ef2846d8a9ba04382617fb1719220ff7992a242410488d2377f97

                            • C:\Windows\{FF8BF137-5707-4c21-A770-A3D756B3D580}.exe

                              Filesize

                              408KB

                              MD5

                              356c2c4d9084b667f4cb59da02841cfb

                              SHA1

                              e2a4772ec3bde1703debb3562166adf56e9fe441

                              SHA256

                              3f348d65310451126f7bf80b0930b855c6227ca87c467bb49be75aec823b6536

                              SHA512

                              5b38da261e2a889371252a9b0a23042f1bf5b15dffc3180d0ebf8827a2c6b393ac72afa25784515fb7cf5d5cf04db8b51e6ccc9bdecb5a187011e5d0d9155bd7