Analysis

  • max time kernel
    88s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2024 12:00

General

  • Target

    2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe

  • Size

    168KB

  • MD5

    d0e3d69df1ada99387d25eeedda146d0

  • SHA1

    a93f7547ea1e75736d985286ad130b5346f994b3

  • SHA256

    4f140f4373776f6963f0ab3fe2de0493b12ad7796d64b5dec64fcaf0ec82f98b

  • SHA512

    b5f16cd47c33937da1b4d8ebeb40992fe1f2c5c127593a8fad6b3e51bdc49dc715f4cc7edb83fe8d55709215599a0a9d9d926138578a0602d91bc51a32eeca1d

  • SSDEEP

    1536:1EGh0oFlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oFlqOPOe2MUVg3Ve+rX

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 14 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\{7187C45A-829F-47c4-9E3F-EDF49E6F9073}.exe
      C:\Windows\{7187C45A-829F-47c4-9E3F-EDF49E6F9073}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Windows\{FB8CB039-5202-4e10-A05D-23CC81EFB7AA}.exe
        C:\Windows\{FB8CB039-5202-4e10-A05D-23CC81EFB7AA}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\{268C7DB9-0F59-42ee-9732-BA537878239D}.exe
          C:\Windows\{268C7DB9-0F59-42ee-9732-BA537878239D}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2492
          • C:\Windows\{08AD200D-3BD2-4d53-AB77-2C04BC3750FA}.exe
            C:\Windows\{08AD200D-3BD2-4d53-AB77-2C04BC3750FA}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\{08DDB082-6DD5-4463-B653-5484E9A8530D}.exe
              C:\Windows\{08DDB082-6DD5-4463-B653-5484E9A8530D}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:328
              • C:\Windows\{FA81DB4C-B8BB-4a50-AAC1-D8E8B2F88DD8}.exe
                C:\Windows\{FA81DB4C-B8BB-4a50-AAC1-D8E8B2F88DD8}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2896
                • C:\Windows\{F9D70022-05C8-41dd-8C2B-0C89C452ABEE}.exe
                  C:\Windows\{F9D70022-05C8-41dd-8C2B-0C89C452ABEE}.exe
                  8⤵
                  • Executes dropped EXE
                  PID:1604
                  • C:\Windows\{30D6A243-3614-4d13-BB28-7DF93D08C090}.exe
                    C:\Windows\{30D6A243-3614-4d13-BB28-7DF93D08C090}.exe
                    9⤵
                      PID:2804
                      • C:\Windows\{3C91BF7A-BF31-4497-BDC2-6A5C380AB5AA}.exe
                        C:\Windows\{3C91BF7A-BF31-4497-BDC2-6A5C380AB5AA}.exe
                        10⤵
                          PID:1492
                          • C:\Windows\{9CFEDEBB-7EA4-4887-A299-5B5958226DA5}.exe
                            C:\Windows\{9CFEDEBB-7EA4-4887-A299-5B5958226DA5}.exe
                            11⤵
                              PID:2044
                              • C:\Windows\{C2072927-D66C-480c-BA1A-9CB7E0746FEA}.exe
                                C:\Windows\{C2072927-D66C-480c-BA1A-9CB7E0746FEA}.exe
                                12⤵
                                  PID:2968
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{9CFED~1.EXE > nul
                                  12⤵
                                    PID:620
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{3C91B~1.EXE > nul
                                  11⤵
                                    PID:1020
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{30D6A~1.EXE > nul
                                  10⤵
                                    PID:1380
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{F9D70~1.EXE > nul
                                  9⤵
                                    PID:2776
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{FA81D~1.EXE > nul
                                  8⤵
                                    PID:2232
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{08DDB~1.EXE > nul
                                  7⤵
                                    PID:2916
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{08AD2~1.EXE > nul
                                  6⤵
                                    PID:2564
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{268C7~1.EXE > nul
                                  5⤵
                                    PID:2392
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{FB8CB~1.EXE > nul
                                  4⤵
                                    PID:2552
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{7187C~1.EXE > nul
                                  3⤵
                                    PID:2484
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                  2⤵
                                  • Deletes itself
                                  PID:2316

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{08AD200D-3BD2-4d53-AB77-2C04BC3750FA}.exe

                                Filesize

                                168KB

                                MD5

                                60a2a3238790f133ffb78393f1a7ba83

                                SHA1

                                a7a6eb1d97f130e0fc1578526ad6e6192c520a67

                                SHA256

                                97cf447d6a44c8aa821dc6df7f1f9833cedf0496249a2c38d5e1c9067f6b8200

                                SHA512

                                8f565e459dea58ead8b1a3082a27328f877d3ac0906fa22e35646a0fc52b5e14fec211523b3b5870aa24d5dd2a769718558c132996d61bcab2e871442a0655dc

                              • C:\Windows\{08DDB082-6DD5-4463-B653-5484E9A8530D}.exe

                                Filesize

                                168KB

                                MD5

                                47f363840ca2b12c20e49ce18f07bb88

                                SHA1

                                839da5dbab2fa6394df100d4b209a883439986d0

                                SHA256

                                2c10d3aa95194c8f6426a84ab1b6c677e80ca33bb12f1626e68ef79d1ef25483

                                SHA512

                                4c717f29ac108215e5382eb9ec80ae565219d583827c0c78fc3061086a06cab9e13981d76279fb562538caa7ab83fe0e73396a2b28db0f56e1de8255ec3f8732

                              • C:\Windows\{268C7DB9-0F59-42ee-9732-BA537878239D}.exe

                                Filesize

                                168KB

                                MD5

                                55a298add247eed69ab6807fb30608b5

                                SHA1

                                617fd3391a1dd17d642a7379e7ccb61c8b7096e9

                                SHA256

                                2fc254617bc5f90abf0a9f5731a42b10a2cd971b3a6333630d9ac71628157018

                                SHA512

                                52fc975eb96dcdebd5b7d3d86439dbbdf569108a0fef4d637a6d7618e4719eece3414b3f80e220e6389eee8b3a2e98b1958ea2bd145e21045879ca339b3d9a4e

                              • C:\Windows\{30D6A243-3614-4d13-BB28-7DF93D08C090}.exe

                                Filesize

                                168KB

                                MD5

                                652f4a6019545dff943a26efdd2c4794

                                SHA1

                                9e11478ca7447d77e77fb624867f71dd93a23fd4

                                SHA256

                                758ae3e3201d3f0e0ce9456bb7a101682088bad10f402815b3c7a967bbb25772

                                SHA512

                                fddc69bf53f1cc3d6ddefca173850727d985cc797e794eb9a4b634bb6ae352d197bdde6e9e781c634884022fa4e160ab43a3dcee531cca79af2942644c04edde

                              • C:\Windows\{3C91BF7A-BF31-4497-BDC2-6A5C380AB5AA}.exe

                                Filesize

                                168KB

                                MD5

                                e3f39c78204221561d9b1e9039af6cb1

                                SHA1

                                aa299c5cc26378d2fdd34c56358e0a779782e99e

                                SHA256

                                77429679eaaffa158f8706b607d0545e0d34e064a31bfc8deb968cbde060f300

                                SHA512

                                a7f6985096e27e88f5dfc217bc4a62b7ea36a19411aad9d11321d66c6983a6eb1a8aeb1ec8faccf8edd6af76ea096481c838bf08bff8f062ea7ae621376109c7

                              • C:\Windows\{7187C45A-829F-47c4-9E3F-EDF49E6F9073}.exe

                                Filesize

                                168KB

                                MD5

                                b135ead38d0dd9271aae64eeae42e9b5

                                SHA1

                                069e7d720396d56b32b44af12596779b36ae4ff8

                                SHA256

                                ba33b09125f2936339179600d8b445bd06bd7165a8a430222d5ca9d60cbc78b8

                                SHA512

                                954dc8e5bf4f256c647cc2ddbee26a297ad80b06c57871c525eb92557e28d57ba43c13e574d3204237e3839c1debcd4ada34036379b5f1648af9d3571d5ecdb1

                              • C:\Windows\{9CFEDEBB-7EA4-4887-A299-5B5958226DA5}.exe

                                Filesize

                                168KB

                                MD5

                                706a7505e594b428f713360956787447

                                SHA1

                                39835f1fb25ccbc9413eb3ca18afc0c50b3e9251

                                SHA256

                                bcc65a2bdf35f99344cfa433a985a2acab246f79c57ae1a7e55ac27b382ce723

                                SHA512

                                edb3b15847271acfb6dfb0bc175248df619b3ec53ce7dd39a56a1d612dcb22bdc701dbccb353a99eaee3f70e161c965dc2988327ac6472087c1aedf3a46eaf87

                              • C:\Windows\{C2072927-D66C-480c-BA1A-9CB7E0746FEA}.exe

                                Filesize

                                146KB

                                MD5

                                0344f96f601455fe295896bd8f9cf408

                                SHA1

                                979220781747c8637530fb2f20ad7c88f82fa20a

                                SHA256

                                a130649eaff54467a3be36ff4f31926b5c0f81815ce6b7b6c142e6551e90116d

                                SHA512

                                7f5715cbc9c69aba12ec27e15a071533f6778be8ee8421e2a2999add4b844faf8e02a6aeca6c027c58e71272cad6085d4c36bb28009c5783e4166e39bdf0a59c

                              • C:\Windows\{F9D70022-05C8-41dd-8C2B-0C89C452ABEE}.exe

                                Filesize

                                168KB

                                MD5

                                b6403a30194d23047aace6345888db2b

                                SHA1

                                586139ffeede3f3f6d42901d016609cb53a44f3e

                                SHA256

                                e85e89576acf2cf5487db62ae57384ae2cc403b30850dc1915b3f55f153dac7c

                                SHA512

                                30c2eec318e4dcb1cf6563b6db494ac28916e0fc1d50b46bc3bb3fe9a298ae09d1836dc6c969f616fd7bc6705a5e204a8196f29d2369b4039aa6f4ffe7e457de

                              • C:\Windows\{FA81DB4C-B8BB-4a50-AAC1-D8E8B2F88DD8}.exe

                                Filesize

                                168KB

                                MD5

                                b5b8c7b6697018ab480d947d1478d308

                                SHA1

                                42581b5c6c6817b63c706443f9bceca17d7129ae

                                SHA256

                                683e617c7d94e2551e0f22652eaab3ef0b9d57457dad9b1f4f1e938416d357ef

                                SHA512

                                5648cb5ee728eba37761ebe15218ed1c9781014fa2d6c293366036a4943a7b8e24d6e75ad45eede097cc011f424a7c58b35b177e22336b2991489e0fb5dcaa82

                              • C:\Windows\{FB8CB039-5202-4e10-A05D-23CC81EFB7AA}.exe

                                Filesize

                                168KB

                                MD5

                                455013b250c923e03e93c57c7b7adbc6

                                SHA1

                                4aa1b40416c0dc9fa3d1d2fc2a19a45be1429a55

                                SHA256

                                c8b1157e4d76c3167130f12393a3080bc97ff40cd211b4d8b3da46082d6a0dea

                                SHA512

                                bb36d3ad73285a2237406dea178b0415895bc0be8ad9e5f9f27d1bc5d6a2184f084413d28310e34cf6a0f637d199821e499805153d71f86fc26ddd224a38e2c8