Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 10:42

General

  • Target

    2024-06-14_6437dabae7d25257bb573a0b73c6042e_goldeneye.exe

  • Size

    380KB

  • MD5

    6437dabae7d25257bb573a0b73c6042e

  • SHA1

    3b7b445c4a9b759d1eefbb5b83c61eb682bae8e0

  • SHA256

    f3f4cd68fdc8e51433cf2ffd0d259b1a11e7b24e1c55e15fc406ff9dcd7b8cf7

  • SHA512

    a0af082c0baa99f0e7cf6d3124a1a71ff448af3ca1fe763c0c71bb52810ba370ed23ba00d2d92ae5541ec4235c2e521c2b9f70d3d7b5aade1869397f121da5c1

  • SSDEEP

    3072:mEGh0oklPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGml7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_6437dabae7d25257bb573a0b73c6042e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_6437dabae7d25257bb573a0b73c6042e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\{782A4978-F7CF-4249-A9B4-B5C0C6ED7DC3}.exe
      C:\Windows\{782A4978-F7CF-4249-A9B4-B5C0C6ED7DC3}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Windows\{2DB76E3E-43EA-4c8d-8226-5655E6ECB2A3}.exe
        C:\Windows\{2DB76E3E-43EA-4c8d-8226-5655E6ECB2A3}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\{42F20FD2-4115-4491-B934-F33198FDF1A7}.exe
          C:\Windows\{42F20FD2-4115-4491-B934-F33198FDF1A7}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Windows\{EFB5D98F-DC22-4144-AC4B-D53CD2753E5E}.exe
            C:\Windows\{EFB5D98F-DC22-4144-AC4B-D53CD2753E5E}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2424
            • C:\Windows\{1992470A-AE22-48fb-8B9B-9A932206E874}.exe
              C:\Windows\{1992470A-AE22-48fb-8B9B-9A932206E874}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2024
              • C:\Windows\{62F5944C-56F8-4ed8-8FA8-F858AFF3BCAE}.exe
                C:\Windows\{62F5944C-56F8-4ed8-8FA8-F858AFF3BCAE}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1952
                • C:\Windows\{920484B4-2154-45f5-B810-FB5590FE4D0F}.exe
                  C:\Windows\{920484B4-2154-45f5-B810-FB5590FE4D0F}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2508
                  • C:\Windows\{3823AE01-B20F-4eb4-B4DE-F688C8C3A22B}.exe
                    C:\Windows\{3823AE01-B20F-4eb4-B4DE-F688C8C3A22B}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1240
                    • C:\Windows\{1AEED756-C3C0-40af-ACD8-16D492495E73}.exe
                      C:\Windows\{1AEED756-C3C0-40af-ACD8-16D492495E73}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1800
                      • C:\Windows\{3BEA6AD6-D401-47a2-BB54-F5036CD10944}.exe
                        C:\Windows\{3BEA6AD6-D401-47a2-BB54-F5036CD10944}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1904
                        • C:\Windows\{38A4E2E4-AAD2-4b8b-9BD4-9434A8291732}.exe
                          C:\Windows\{38A4E2E4-AAD2-4b8b-9BD4-9434A8291732}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1472
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3BEA6~1.EXE > nul
                          12⤵
                            PID:1768
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1AEED~1.EXE > nul
                          11⤵
                            PID:536
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3823A~1.EXE > nul
                          10⤵
                            PID:2712
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{92048~1.EXE > nul
                          9⤵
                            PID:1164
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{62F59~1.EXE > nul
                          8⤵
                            PID:1568
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{19924~1.EXE > nul
                          7⤵
                            PID:1724
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EFB5D~1.EXE > nul
                          6⤵
                            PID:1664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{42F20~1.EXE > nul
                          5⤵
                            PID:2272
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2DB76~1.EXE > nul
                          4⤵
                            PID:2700
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{782A4~1.EXE > nul
                          3⤵
                            PID:2060
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2328

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{1992470A-AE22-48fb-8B9B-9A932206E874}.exe

                        Filesize

                        380KB

                        MD5

                        0f490711e4ddbe1eea829e4ce95a90d2

                        SHA1

                        e9ea3fb97d78daa0612fb1c94be52ce43ae36744

                        SHA256

                        eff79b2428b496607670eb0bd09143260016020964b8354ce344b488375bfa0e

                        SHA512

                        f3641a5cdb215d2134fb2816a26963d755654928363efd93e043b95a1ae52e54c4bc7ea78d8f7a961aa7986bf5ef6e6b98496cefa236a6cc2655d7db784e340c

                      • C:\Windows\{1AEED756-C3C0-40af-ACD8-16D492495E73}.exe

                        Filesize

                        380KB

                        MD5

                        1af2913f28cfc27c6e702cccf620d29f

                        SHA1

                        b3e35c92afa686dd6e08564f39a50218f59d6247

                        SHA256

                        57e3f9a3c7999a037e7d88723b4831ec9be7b7ee6aa8dd795bd99b174f535e9a

                        SHA512

                        b1845428c2e8579201f74cccd2ed2729a16212b9c1e87cbe118bff0c3e86b78c28a24d7b4f512581304237aa132ecc3fc1a8f394c2d770ff17f578baaba2ffe3

                      • C:\Windows\{2DB76E3E-43EA-4c8d-8226-5655E6ECB2A3}.exe

                        Filesize

                        380KB

                        MD5

                        119fd99b939e8c8d3ff7137adcbf516a

                        SHA1

                        e8f5e84814970f271e09d34fe4432b1df833c82e

                        SHA256

                        f783960eccfeda1774bbe67e9b68c10eb1f5a82478f3cfdb12b40e7c1877ef96

                        SHA512

                        2fbc4be28bc4fd1fef3bf38fb0f8569430e65b296e4f5f7996832007bab815fab846fcf8dce0f090b18e51ca0826ae8ea6f2f3819a22e31122b824e54f977449

                      • C:\Windows\{3823AE01-B20F-4eb4-B4DE-F688C8C3A22B}.exe

                        Filesize

                        380KB

                        MD5

                        afbf778ecf8d9c759ef920153a5660a7

                        SHA1

                        4f1ac9ab2cedc3bf2331cace28e235af171175a2

                        SHA256

                        5bb06672cee37df0120edd28c331fcd271bfd8c3a342021e3883a11b3776f4d3

                        SHA512

                        9dcd248b063527144494c24d6a73f72067b7d36f7fe9c105af952332e72964fde53c47fc8ca90884b56bf884924e3370a529dd43a84f0725b5eb7bd4a10113d3

                      • C:\Windows\{38A4E2E4-AAD2-4b8b-9BD4-9434A8291732}.exe

                        Filesize

                        380KB

                        MD5

                        597938555ea5ae0395033f0fa3ed7f59

                        SHA1

                        d97d0c135b6803ba605c4ec4a97ca9e8ec5c8ac0

                        SHA256

                        b4d52f8ada83120c25502567e8505e016696a8a538d5471aa9c52b7b6a580abb

                        SHA512

                        888aeab05f314b0a498ad36a54085b7a46bd204add383d8a7afe30673a395afac9007965180f7599bee9fbcac7a5d93176b3954f091bdc15a2b3a298b93b3e0b

                      • C:\Windows\{3BEA6AD6-D401-47a2-BB54-F5036CD10944}.exe

                        Filesize

                        380KB

                        MD5

                        1358eabb0cc77a8fabf7a1ebb0e629db

                        SHA1

                        342890986d3e0abedfc9a8cb8e551818736bce82

                        SHA256

                        002a1c426222b81cf1c6b7212800cbc277fdc7a7e972a2b1e91077b81a9616b6

                        SHA512

                        5b47501e959d13e959398d5547f669781d35ff8798f94c76dc7fcad20712807e20fc3ca32623ee0b75926b6b23981e45b078aadd1f82a05ef1a9d213cb7bd53b

                      • C:\Windows\{42F20FD2-4115-4491-B934-F33198FDF1A7}.exe

                        Filesize

                        380KB

                        MD5

                        e03bac61038285fe5939193271f1bc20

                        SHA1

                        12fa6503cbbd04fd7c660de4f621e4f91686dca9

                        SHA256

                        72d32ab0cbd74f9b1504fbfa5c73eb31a8b86750fa0403eb749bc99b1d2f1ba4

                        SHA512

                        f05ee8dd216ca5d63ca3c4f386bbf1de1df9900f6c5ad26b7c769d0df495215873f379928ef5cc084c0b122bac7ea5d869d728b257bf648668d2f7040f4842f6

                      • C:\Windows\{62F5944C-56F8-4ed8-8FA8-F858AFF3BCAE}.exe

                        Filesize

                        380KB

                        MD5

                        bd7ac28aab12a223380ce19bd0080e7f

                        SHA1

                        ea6c11f7fc0ad8054bb5910bf86f27d311b3d5cb

                        SHA256

                        43a56c9e0b3718fa188a43b3fa9d36c71732e0b84ac1a2babd19ecead8210202

                        SHA512

                        172cf1b556e8d054138a1c45d807eb0b36e9ce34bc97f14f84f80fc6a1573030dde94d8c631eb7a126f32d3b97ea9599ccb60138a5d0a4f6661129662ac1f1bd

                      • C:\Windows\{782A4978-F7CF-4249-A9B4-B5C0C6ED7DC3}.exe

                        Filesize

                        380KB

                        MD5

                        59b1128e2ead740050da73b600ef00f6

                        SHA1

                        0e24c778c7f4f35baf02bb458c6866a5c7b6b1ee

                        SHA256

                        64de31c642eb306daafd3e8374aec98dabfe4ceb678f280fc99f77964e8980af

                        SHA512

                        6b7113e9ae4057b9bef369a8cc3d0ac0bd145af35c0069f828af3bf798c27a2b55caf3b22205d2cc71b0e7d9fc19d57de47f9935c75ec5ec19f29d59524b2860

                      • C:\Windows\{920484B4-2154-45f5-B810-FB5590FE4D0F}.exe

                        Filesize

                        380KB

                        MD5

                        90672a7b10361b2acbbd446359ce598d

                        SHA1

                        54a1bbbe60fbdaa850e34997cceda43c9ac28e67

                        SHA256

                        f12ed9eb3fa70f6d5e5aada8243c85db20ef5571a2e15dae993f308fdde3857e

                        SHA512

                        6faf968f8c8b0ccbf87f214b5ce839363e9529e1c9660a84401d843bbf846b2f0942ee0d8d0de382111f756b0bd2ba85264ce7e457d1d95e4173af40a51a9a79

                      • C:\Windows\{EFB5D98F-DC22-4144-AC4B-D53CD2753E5E}.exe

                        Filesize

                        380KB

                        MD5

                        c07805cdc49f2c4ed1bf848dc22044ad

                        SHA1

                        38db1dc364b1a5332ca34aa58f9353c5c61c8146

                        SHA256

                        3f7c68e025aacac106c4e98e6192d7be9401df852c872fb3fc77beb54270bb36

                        SHA512

                        e34a68cfff650d33efb6d19a8f828f10321ecbc997b750a806db1a20e4756cee05b9b1db34ef2d146a49ac10b9e5b2efcf710d1eaa42679821df07c396306f42