Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 12:56

General

  • Target

    2024-06-20_4cccfcc2436536d5b1657f236c28717e_goldeneye.exe

  • Size

    180KB

  • MD5

    4cccfcc2436536d5b1657f236c28717e

  • SHA1

    e474c8daeed4d8eef294452799cc034fd5205d4a

  • SHA256

    0ca88cfbbb4737ec2c855a1a9f95e0990c6c90aacc1c21406fe4cb92921a046c

  • SHA512

    d0353de010b91e14fe354a02111181a4d1f27091ef429c0620434d4313bd83ca31fa26301cefdd265721d031771c17fc71bc89d40e855ccf1ffb972d4c01d182

  • SSDEEP

    3072:jEGh0oglfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGKl5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-20_4cccfcc2436536d5b1657f236c28717e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-20_4cccfcc2436536d5b1657f236c28717e_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\{B2950881-8076-4e51-ABC0-B6A03E48A4FF}.exe
      C:\Windows\{B2950881-8076-4e51-ABC0-B6A03E48A4FF}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\{0590A496-FA70-4879-A921-4A6E8A080BF3}.exe
        C:\Windows\{0590A496-FA70-4879-A921-4A6E8A080BF3}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\{7707E19E-D3CE-42bd-B599-32EC94829E4D}.exe
          C:\Windows\{7707E19E-D3CE-42bd-B599-32EC94829E4D}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\{4D87D16F-BC0E-4b8b-9977-9FD0A9145B13}.exe
            C:\Windows\{4D87D16F-BC0E-4b8b-9977-9FD0A9145B13}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\{03F26ECE-64BD-40ae-B738-80AB685ED25F}.exe
              C:\Windows\{03F26ECE-64BD-40ae-B738-80AB685ED25F}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2848
              • C:\Windows\{4788CA2D-0E5F-4fb3-A8C5-15A2B272C250}.exe
                C:\Windows\{4788CA2D-0E5F-4fb3-A8C5-15A2B272C250}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2904
                • C:\Windows\{B227CAA5-A5D5-4256-9CA5-38F35FA8DA02}.exe
                  C:\Windows\{B227CAA5-A5D5-4256-9CA5-38F35FA8DA02}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1612
                  • C:\Windows\{6E320EBF-DB24-49ef-A1CF-319ABB05EA5E}.exe
                    C:\Windows\{6E320EBF-DB24-49ef-A1CF-319ABB05EA5E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:468
                    • C:\Windows\{6B0821FD-B8A0-41ac-8127-96F0D7CC59C8}.exe
                      C:\Windows\{6B0821FD-B8A0-41ac-8127-96F0D7CC59C8}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2004
                      • C:\Windows\{205A7B97-52B9-46c7-B65D-E5582EC731FF}.exe
                        C:\Windows\{205A7B97-52B9-46c7-B65D-E5582EC731FF}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2504
                        • C:\Windows\{01313F0D-AF70-4da2-B934-1062B075DD61}.exe
                          C:\Windows\{01313F0D-AF70-4da2-B934-1062B075DD61}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:336
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{205A7~1.EXE > nul
                          12⤵
                            PID:928
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6B082~1.EXE > nul
                          11⤵
                            PID:2044
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6E320~1.EXE > nul
                          10⤵
                            PID:2620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B227C~1.EXE > nul
                          9⤵
                            PID:1396
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4788C~1.EXE > nul
                          8⤵
                            PID:764
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{03F26~1.EXE > nul
                          7⤵
                            PID:1940
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4D87D~1.EXE > nul
                          6⤵
                            PID:2868
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7707E~1.EXE > nul
                          5⤵
                            PID:344
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0590A~1.EXE > nul
                          4⤵
                            PID:3068
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B2950~1.EXE > nul
                          3⤵
                            PID:2628
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1152

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{01313F0D-AF70-4da2-B934-1062B075DD61}.exe

                        Filesize

                        180KB

                        MD5

                        ef7e8dc27340709dfd6f6501de2fda20

                        SHA1

                        61f9b048c9f7952687554ad8d5eb33a8c9f3df19

                        SHA256

                        370fe6114b017ad1fde4e8637fc0240ce5a0bb5ca7fb21764a1098672a84875b

                        SHA512

                        9a77ce87962647848d4f96884ec2e022405f4880b7894fab64f9c232b94fbe356fa6b616ce61306780fad86a60e080206a8703b7c66489402ca3ed21cb386dab

                      • C:\Windows\{03F26ECE-64BD-40ae-B738-80AB685ED25F}.exe

                        Filesize

                        180KB

                        MD5

                        40260b5785b81d15655e2b62020b05a9

                        SHA1

                        dc16e1482ed8963ef768ff94e2a4119b41fb8ef8

                        SHA256

                        61e16e3e28b608b7eb7dc1ecdfa01393e677df74770410a47dd79d16b885b0a2

                        SHA512

                        342000721b873da01685ea16589e73dc7da9ceb72bf90070d1bc048e343d38b7675eef22e7fcdf32143bc87fcb3cfa0e44092d42b3d78a730f42ded08d8d228e

                      • C:\Windows\{0590A496-FA70-4879-A921-4A6E8A080BF3}.exe

                        Filesize

                        180KB

                        MD5

                        faf3ca900e7ba1291a427312dfe4e504

                        SHA1

                        3ebd5c1410c487a3ec28900bdf193178790c37e2

                        SHA256

                        680c8a268543c62726167a7c8a75f30f24c57fe67ec0d491e1040d80fab44fa0

                        SHA512

                        dec33708069a30409b117ca72489162873a246fcf67f9c8b88c129fddc2bd13d73c8c74f0b3e75b6dc4df931210ad2f06514cf3d2fbfb4a769500e4ac73cb663

                      • C:\Windows\{205A7B97-52B9-46c7-B65D-E5582EC731FF}.exe

                        Filesize

                        180KB

                        MD5

                        ea3c0a98a9794e2ac8a26ebab8c168a4

                        SHA1

                        e947f349e845fecb0ca28cfa2e4553a98628bb27

                        SHA256

                        36d8f782c96e42beea1be02c700e842ec815e2f3433a65666255554febccd5c8

                        SHA512

                        30b68387290015f6438a100a9a9354f50ecc716b25622fea1a162f42d1dc00d266e9b92cf18423f4e70a445b5b4e7c4305a573fe484537c1524ae718924f7a3c

                      • C:\Windows\{4788CA2D-0E5F-4fb3-A8C5-15A2B272C250}.exe

                        Filesize

                        180KB

                        MD5

                        6e2ad24f06a26e0d036356c534c86742

                        SHA1

                        376734510e9301431c42ce621ec6b0e7f3b7a80f

                        SHA256

                        75c51a5a386db095e647b4b49f2199c8f8dd3ab4dd669a1d454ba6ba740338e1

                        SHA512

                        c97d31fb185fbce390e9ee0b3f98498132e8e721cccf4e6ce22633d3f4ec74d160033deab8d9bc8e7f4e851ee3bb167fae6507daeae95744581043d37206fdfa

                      • C:\Windows\{4D87D16F-BC0E-4b8b-9977-9FD0A9145B13}.exe

                        Filesize

                        180KB

                        MD5

                        969c75f611f1641d85ee2bd1f69b5e68

                        SHA1

                        136c7eae4a37751eab3a77e7cf29e2a95b48f972

                        SHA256

                        89cea5fd08f4482428ec6ad3b1f33c68aa27570aec6e0ec80c037fd0e4a5289f

                        SHA512

                        c4097f7d53a4e9bc655fcce2dffb4bdf753507e9afe23b0d11be68e76997cd11376662e351f0b4b3c10f8ff96f5ed6973e7a7d50c27f9076a71d2b9809ae9ce6

                      • C:\Windows\{6B0821FD-B8A0-41ac-8127-96F0D7CC59C8}.exe

                        Filesize

                        180KB

                        MD5

                        17558ee584d6947a61e6031b9886b53c

                        SHA1

                        de6460eea54b03de1fad41f53ae66f6b3014653c

                        SHA256

                        465800044f7eb64cd02eb1d6df23a185086068d94c9e61d3086def1dc732e4c7

                        SHA512

                        62a8cee4b135deb375cc60ce7f08116f3eb9699d719a13bf2d523dd0eed3c23c8e954c1025e0ff2c8ce6a04032f93e1cb621a283fb659c1035606e5f5b34b9dc

                      • C:\Windows\{6E320EBF-DB24-49ef-A1CF-319ABB05EA5E}.exe

                        Filesize

                        180KB

                        MD5

                        0a88a8cd78103949bc29530c84b91312

                        SHA1

                        474f123bb275753fee7587c265fda2c9b9276b55

                        SHA256

                        3774f4a6478ec4b4d66825a12f2f6105af2e5bcec8fbdb9ff08bce6bf4f041bd

                        SHA512

                        e3de7d84f1ea4eb9131c9646291ec58cac4ef8c2ac84fabf9b2f941551c8b3a77b474e53dde7bdb44a6327c4a88cfa160041ce8d4b3ae5da401a0ab0768153b7

                      • C:\Windows\{7707E19E-D3CE-42bd-B599-32EC94829E4D}.exe

                        Filesize

                        180KB

                        MD5

                        b3057dd328226ddff1a99424312b6e61

                        SHA1

                        33475b0c8a278c1edf5bf62a85dc6860d7eceb79

                        SHA256

                        5e0ec4d91717930603cb6ba9d55e209480d52cb883704e77952b603597dafdb9

                        SHA512

                        2c562f66e751749b8c1ea3216e828741461985d74bc1dd90021db657eec71c68392bbf54f9c5aed0da7b1e2bd980d34920a1714a282405c7129da3a51eca13cf

                      • C:\Windows\{B227CAA5-A5D5-4256-9CA5-38F35FA8DA02}.exe

                        Filesize

                        180KB

                        MD5

                        cfed475925d8a36dcad533fe05f4a15f

                        SHA1

                        45401ef663f7e07145cddd6cd303d1b84b920878

                        SHA256

                        bf50d3711c9afcc08b20213c6b41b150e04c1d1ffbb58cc8be0f67c3e21d0ce5

                        SHA512

                        b824ff7635e980411b37dd12de5674ddfd8033a06918c811f2efd915f21fbe0ddc8752ccba5f7162f2e6358f3e84273935a1127d11b5de8a4c3bf9f1d01cc4f7

                      • C:\Windows\{B2950881-8076-4e51-ABC0-B6A03E48A4FF}.exe

                        Filesize

                        180KB

                        MD5

                        6d69a079b0587e03bf7baad282e2ba8e

                        SHA1

                        9bb48eb3d6ad3aca966d6cb38cedb23fb79d544b

                        SHA256

                        db3c2c500ca11266684583f5b1faad698ba8f83f15b083638a6609af851906a7

                        SHA512

                        63806253eea8ea48864017f6192bd0c8f3eee646f64c8880a045fd50ddf2cb3c41af33ba57f83f9a6b9474026fb111be9a38a6fa60a599548b78e33d258cdb70