Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 11:32

General

  • Target

    2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe

  • Size

    380KB

  • MD5

    e39403bcc0ea77af619c2a4a8501949e

  • SHA1

    04b5e385cd6c75892a5397df786ab4160ed4d77c

  • SHA256

    efe0ece8e69aaecbda78c13bf5cbb26a9ab862413fbd4e8885ffa9d481659c90

  • SHA512

    c0b7b03094e85180f4ecc1ede6a971a06e5a42873fdacfc658ea3451388d7d8fe99e3ec0c55bfb6449175ed13799d6aee8b9e827c2acab69d1c5afa55841a1d5

  • SSDEEP

    3072:mEGh0oslPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGWl7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-15_e39403bcc0ea77af619c2a4a8501949e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe
      C:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe
        C:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2468
        • C:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe
          C:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe
            C:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe
              C:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2788
              • C:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe
                C:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1532
                • C:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe
                  C:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2192
                  • C:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe
                    C:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:744
                    • C:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exe
                      C:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2832
                      • C:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe
                        C:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2228
                        • C:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe
                          C:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2824
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D47ED~1.EXE > nul
                          12⤵
                            PID:892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{79B80~1.EXE > nul
                          11⤵
                            PID:2892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D3CD4~1.EXE > nul
                          10⤵
                            PID:1828
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{59C6B~1.EXE > nul
                          9⤵
                            PID:2828
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2C6BB~1.EXE > nul
                          8⤵
                            PID:2352
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C647B~1.EXE > nul
                          7⤵
                            PID:2196
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E71CE~1.EXE > nul
                          6⤵
                            PID:2364
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FB001~1.EXE > nul
                          5⤵
                            PID:2528
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{81060~1.EXE > nul
                          4⤵
                            PID:2120
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{313B8~1.EXE > nul
                          3⤵
                            PID:2620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2616

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{2C6BBA9C-2ABA-42b6-8825-1CC97A4B2A7B}.exe

                              Filesize

                              380KB

                              MD5

                              81e5b8e73dee0bf5ef2b3ad68681c104

                              SHA1

                              feda9fce36c5a3c58ade9c4e944ea84fd518bd6f

                              SHA256

                              480bb2d6ed5b043fb3bd59e68c2bef121cfccaf047b7697abada57154e0303e3

                              SHA512

                              779391a5d037172fa8f5b07ce518b485a436154684b1a6192adb72dbcfa3e8270f067a1b021e746c0a78069ce0cb67dafd826ff2b11ef48537bb11ef2330d00f

                            • C:\Windows\{313B8C54-3BCF-417e-BD79-662A1A68B0EF}.exe

                              Filesize

                              380KB

                              MD5

                              5a83f8b8638cf9ad8c69754d45773d2c

                              SHA1

                              b95ae5409805e726a220b24a2c06916d26365d75

                              SHA256

                              b7df14cf2ac76c716e3deef3cd94a3899cda82666eb9e89f4627d8d37d03d2cc

                              SHA512

                              505e15f33680b9de0195f42143fd2b49f712d5c6ff1eaf966f8b3d60f703b57e35c895a4473e1706deff0b2956695572819d98c35234cf77851c408c788e7148

                            • C:\Windows\{35180AC3-3E71-4118-BAD8-3CA388EBB821}.exe

                              Filesize

                              380KB

                              MD5

                              de33eb3140777a45736a7383fdbe4634

                              SHA1

                              1f9f82f412c583675e130c5e5e3122c7b4eaf510

                              SHA256

                              c7fe3bae7a9690623ed79ae8f8628c622bf994f3123066dc84a0cd305000b889

                              SHA512

                              fd0515ccf06ae81bc85e51d8514a66466a99d19edb1766494350e3ea5f679b9aabc50ea03f32e0b50630bdd9dfad1936ab8de009ea94c0e81cb2908f11af146a

                            • C:\Windows\{59C6BBDB-0F59-4948-9C3C-19ECA174078E}.exe

                              Filesize

                              380KB

                              MD5

                              0d0cb4d1f8f2abc3040224eb7d54223f

                              SHA1

                              08eed8a28baab327c448509d97a54c3c928e46d6

                              SHA256

                              8ac701923912972a932ef0cb69f26f2103aac56afe4d6943c1e9673b765520a3

                              SHA512

                              3af04d76c6cc8c31ad3f9cf61758391c0f89a8cd8b8f5f580811584745389f13bf5586ff8777091accb37848323701f78f984b7c23695bb45f9606159cd6a874

                            • C:\Windows\{79B80C7D-2140-4384-B484-502600728171}.exe

                              Filesize

                              380KB

                              MD5

                              567ff46190129c1ebff5824d614f55c7

                              SHA1

                              0c05fa5e9db1b60c06cba1aec467143958781604

                              SHA256

                              39821d39e625f332e64e9e3f2c3186f8d43e8a3c301c1563c322a40a53af192a

                              SHA512

                              95aa6af712218128968263f0630c593d5b91191b01276abc956d79d1f3beb9788579545f0cd8a13114bdc40aa0aa9c55d7569830fdc39c8c887d90eba8255c69

                            • C:\Windows\{81060FA4-D79D-460e-9F47-8E74E5978E6C}.exe

                              Filesize

                              380KB

                              MD5

                              5ac497d0d7d417c769bbfff43b58940e

                              SHA1

                              28d04eeb8e3aa7e64d24b2a1d35a004f94f95479

                              SHA256

                              7a8daa5ad21f323baaf5bdfa26d9fac6f39485606bbd7fb25d86b2f0789a825a

                              SHA512

                              69c101cfc05ee6b5a87f3378bd91dd384b63e3748413255f11885956ca9bf3fd79f9c3626634a23659a019353900f7651284f70bebc6aaeffeb015a4de0f7526

                            • C:\Windows\{C647B793-2863-4f79-8F47-2520498AD6F7}.exe

                              Filesize

                              380KB

                              MD5

                              fa78adeb4463b2ac0c126a84b4282216

                              SHA1

                              a8377f065008768dae1a25dd509b3368a9e43cbf

                              SHA256

                              da59bef7f241019d672ede884b9e931c58980dcceb03023de73eba9241639499

                              SHA512

                              60a01874bf0eebacba7851ca7c0cc48034c41dea819510ae88cad5ce3279517230da9efc9bf371666d57e0437a1582ee7980211397e1338e9c37b6ebb4b371f0

                            • C:\Windows\{D3CD4F8A-07AC-4c70-AE57-1EBF9FC028F3}.exe

                              Filesize

                              380KB

                              MD5

                              6e9a7f269245d286a6caee0fbc31382f

                              SHA1

                              73e49e8dca60982950de82c34cb69e6983ad2d42

                              SHA256

                              64ad950c2b4d63b1d52ccd5dab6907963622556fae4b88a3f7873fbeae0b75d6

                              SHA512

                              7bea9571c09d5150ed67b60a44f71f3c10ddafd973901c6ba5101bbed7ac15198ff96a8aebc9f07b538434b62d11dff5317cc26a0f60a29c2f73a787d1805034

                            • C:\Windows\{D47EDF44-C322-490f-BDD9-FA7CF21EC009}.exe

                              Filesize

                              380KB

                              MD5

                              93e3edc64d9d7c0cd88d8259b6c73cbf

                              SHA1

                              2de3caf4b9e573c1f520ffc555a05324ad1adb1a

                              SHA256

                              3d69271047801318fe00a716c7aa99cec9c52c822350c7289b9741f3ab24f423

                              SHA512

                              c1c5a83dfb08c2914bd58711c858c4365ad7fd2bd9db4775ed4b9ef60a07be1bfc72a44f6c969af27e90a05a3c6386d2f0ceb3662af6c8d1910f19a9aa0ffca5

                            • C:\Windows\{E71CE282-C23F-4289-9132-E6C01DFB42B8}.exe

                              Filesize

                              380KB

                              MD5

                              408c6b91ae1757543fe89f71e67e2db6

                              SHA1

                              975c430acda27b109ebc45944ada6c3f8f9360ff

                              SHA256

                              364e3abd195dcf70a8848a974607b6cad98b69ff6a2ccb6866cda8940e876ffc

                              SHA512

                              08d0999ebd18750d766c4e7cf058adad4b97440da9b9bdd1d36ba79959f6f30fbb390e979f5b63c299f109ac0e9c3654b7482518b4490dd2059004d9d7f37d61

                            • C:\Windows\{FB0018D7-F6D7-4bc2-9ED2-CCA4D1F0C41E}.exe

                              Filesize

                              380KB

                              MD5

                              292dc5af29fe5afbf54d84e394d8a959

                              SHA1

                              80b9f0da2f842373e26d7fb5eb8dd2b06d02245f

                              SHA256

                              965327bd333022c47dcd04f0624a7a3ee3a4c188dc58e8ebc1a353fbc6662b2b

                              SHA512

                              b06b9244c9c9af040399e8a2ce3140802f06eb13d72266177106ebe3d6a85a2a278aa5e1cbccd2262513006bc25b58cf332ef4c7f7ccf447c7ba629a63a272fc