Analysis

  • max time kernel
    75s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 12:00

General

  • Target

    2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe

  • Size

    168KB

  • MD5

    d0e3d69df1ada99387d25eeedda146d0

  • SHA1

    a93f7547ea1e75736d985286ad130b5346f994b3

  • SHA256

    4f140f4373776f6963f0ab3fe2de0493b12ad7796d64b5dec64fcaf0ec82f98b

  • SHA512

    b5f16cd47c33937da1b4d8ebeb40992fe1f2c5c127593a8fad6b3e51bdc49dc715f4cc7edb83fe8d55709215599a0a9d9d926138578a0602d91bc51a32eeca1d

  • SSDEEP

    1536:1EGh0oFlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oFlqOPOe2MUVg3Ve+rX

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-30_d0e3d69df1ada99387d25eeedda146d0_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Windows\{4DF28D1E-328B-4d8b-942F-2BA5A79AE2E5}.exe
      C:\Windows\{4DF28D1E-328B-4d8b-942F-2BA5A79AE2E5}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\{53005EB2-2C00-45f9-A3AA-2912EA0FDA25}.exe
        C:\Windows\{53005EB2-2C00-45f9-A3AA-2912EA0FDA25}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\{66370689-2728-474a-993F-FB6F2D1A7A74}.exe
          C:\Windows\{66370689-2728-474a-993F-FB6F2D1A7A74}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Windows\{6AC0BC5C-4621-45af-ACFE-4C2DCBB27B7C}.exe
            C:\Windows\{6AC0BC5C-4621-45af-ACFE-4C2DCBB27B7C}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1088
            • C:\Windows\{5B722C7D-2A13-4046-8F9D-8C38AD088035}.exe
              C:\Windows\{5B722C7D-2A13-4046-8F9D-8C38AD088035}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4028
              • C:\Windows\{91C9DCC8-AAC9-4e46-8308-940E144E1185}.exe
                C:\Windows\{91C9DCC8-AAC9-4e46-8308-940E144E1185}.exe
                7⤵
                • Executes dropped EXE
                PID:3352
                • C:\Windows\{B6599341-AB9B-412e-98EB-A80DB33EEA74}.exe
                  C:\Windows\{B6599341-AB9B-412e-98EB-A80DB33EEA74}.exe
                  8⤵
                    PID:1976
                    • C:\Windows\{24A94373-85F6-4f39-89E4-80382E2B819B}.exe
                      C:\Windows\{24A94373-85F6-4f39-89E4-80382E2B819B}.exe
                      9⤵
                        PID:3908
                        • C:\Windows\{E1FD9F42-1F1E-47c7-B74C-CD121F593F31}.exe
                          C:\Windows\{E1FD9F42-1F1E-47c7-B74C-CD121F593F31}.exe
                          10⤵
                            PID:1700
                            • C:\Windows\{EF069C89-279D-4321-BFC5-60742E2C1114}.exe
                              C:\Windows\{EF069C89-279D-4321-BFC5-60742E2C1114}.exe
                              11⤵
                                PID:4740
                                • C:\Windows\{FB598076-152B-41a3-8E02-0E5DB7E8B305}.exe
                                  C:\Windows\{FB598076-152B-41a3-8E02-0E5DB7E8B305}.exe
                                  12⤵
                                    PID:3684
                                    • C:\Windows\{BF789289-3024-45b0-8361-03C9B687E79C}.exe
                                      C:\Windows\{BF789289-3024-45b0-8361-03C9B687E79C}.exe
                                      13⤵
                                        PID:4252
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{FB598~1.EXE > nul
                                        13⤵
                                          PID:2660
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{EF069~1.EXE > nul
                                        12⤵
                                          PID:1496
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{E1FD9~1.EXE > nul
                                        11⤵
                                          PID:4648
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{24A94~1.EXE > nul
                                        10⤵
                                          PID:4736
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{B6599~1.EXE > nul
                                        9⤵
                                          PID:4556
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{91C9D~1.EXE > nul
                                        8⤵
                                          PID:2596
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{5B722~1.EXE > nul
                                        7⤵
                                          PID:2080
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{6AC0B~1.EXE > nul
                                        6⤵
                                          PID:3160
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{66370~1.EXE > nul
                                        5⤵
                                          PID:3336
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{53005~1.EXE > nul
                                        4⤵
                                          PID:3304
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{4DF28~1.EXE > nul
                                        3⤵
                                          PID:2200
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                        2⤵
                                          PID:1480

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Windows\{24A94373-85F6-4f39-89E4-80382E2B819B}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        8a65c227e483f2145ba20636060c4128

                                        SHA1

                                        f876f66bdbebfb49fe54c33c14f267d1f80e8035

                                        SHA256

                                        7f410f3de7f5ffdf188107b122efec02f838e3953c921d7d4ec92eff44035584

                                        SHA512

                                        1ee5feef7f24c7ac06b4f0b92bef2ac3cf063df4a01946ae373fef5669df395d54e86e18f00348afaff25fbb001eb966ca95795d35202f95ad4ef587529e3318

                                      • C:\Windows\{4DF28D1E-328B-4d8b-942F-2BA5A79AE2E5}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        0efdc2931fc88def34165119427bebad

                                        SHA1

                                        122cc9806f32b03b2137f0bcffa99f6a83a85cd6

                                        SHA256

                                        554d58bb4062adc134936769a289e356f6b7115d47a79343baf75841a9993b04

                                        SHA512

                                        29bdadf60eabc1c56c61a8e818bd3923727dcb7dfcd692a92bb9ba97d2997f50bbcd1b5678f3014545720e930a76fcda9344b121c1fa280d0fe8f67737e42bb4

                                      • C:\Windows\{53005EB2-2C00-45f9-A3AA-2912EA0FDA25}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        f97598d88a5a2352b4bf39143aa92ea6

                                        SHA1

                                        cc6a4088608a4cf32fa6502e0af43ea94a4f9f16

                                        SHA256

                                        7e0ba868de3d3caf4f6f58cb3d7f1ca9c68a8129f6bbbfc5dfc015586a0d516b

                                        SHA512

                                        773c70201291888eaed4b943a00727862da79e3fabb1f19dd03886c3383518633175aae846b5514f0c4144b0931b3fe3a0bd18c9708f708b8531519ffddf70da

                                      • C:\Windows\{5B722C7D-2A13-4046-8F9D-8C38AD088035}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        ebef495738c256dc53055a1fc602f335

                                        SHA1

                                        42c1affb67616cd9cf75261b3a3f3f11b8a718bc

                                        SHA256

                                        75c00ff7382ea7e6b16de12c6aaf09e3493ddc50385e5b5d7c7f8898d7a8cf0e

                                        SHA512

                                        415c1ae69317d76b592ed08c2ffea978c9a990ca942b8b3e8fc247053f6ef99a22a718d94a170a7f75e774de80aa2a61296a59dd5c5d72434f7cc8a0279723ca

                                      • C:\Windows\{66370689-2728-474a-993F-FB6F2D1A7A74}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        2b90db1344d0313e897da928fdba2406

                                        SHA1

                                        b334f86782affda078be9c256b6d7d5092495f93

                                        SHA256

                                        3c9eab90efffe9686c24230cf61415432495d81e9b3c3223199e161ce14cc1de

                                        SHA512

                                        f1d7435eb39ba3cb7f0e2bf7d8cb86770c3b184b3d6255adb09a7e84386e4c124bdc9377af1110622ffd2668f39cb4fb34de88f1be2c88099a3e476dbf20e5ae

                                      • C:\Windows\{6AC0BC5C-4621-45af-ACFE-4C2DCBB27B7C}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        974f64d2897a2eedf3b6413b1e8097c4

                                        SHA1

                                        742447dabe45761f323dd0d192cc3a22a2d5b4ec

                                        SHA256

                                        16129e285f94ee9a80b08649bacc5a236833858d3646fbf585893c4d60045c0a

                                        SHA512

                                        3754acb9c3cd0511585fdde8c5e6f3a2f3c7ac22cf68b9a92e26789d1713ba8db7d32cbe193a7f80cdefd13ea687318089b369ac83d2e3604f074358fd1817dd

                                      • C:\Windows\{91C9DCC8-AAC9-4e46-8308-940E144E1185}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        e22ad1dfc71efd8a357726fbe8514d29

                                        SHA1

                                        30e98de628ef60f0fc8b2597ec99b110f9b9d249

                                        SHA256

                                        ccbe5c0f3122a88ca166a1f161ea135554f93490afd3b21a4eb0b009d9079dfe

                                        SHA512

                                        8a4b289d9cea3f8373a0f949b3af73003a7be01d712ee667807e139d9780f0c852af7be344f26edfb0d5063249deca0170ff085a804b0a31b861e6e2bbcca652

                                      • C:\Windows\{B6599341-AB9B-412e-98EB-A80DB33EEA74}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        3b1f230c9e76cba7672ed8922eee9fbf

                                        SHA1

                                        fde889470ea0045859d44923647c5b1f712740c9

                                        SHA256

                                        77204068e614822a820878b55cc7c184f9254d92f694bd47a9c87f989722b9de

                                        SHA512

                                        2044e8d16c1068a0e18baec812bda55d0b32a8512148e2fc274cfc8014e429d83a5939f4d092806e17c2087927d70f0280cb544daf01083c8b65ca6f0b10264b

                                      • C:\Windows\{BF789289-3024-45b0-8361-03C9B687E79C}.exe

                                        Filesize

                                        22KB

                                        MD5

                                        bf2d4cdf476ebe04d397401d9bd10844

                                        SHA1

                                        7d27e183044737155947f178609cc0182dd3cea0

                                        SHA256

                                        a1c8d1688d827c1d1a8a35a582ffb635c99d6feae90d490197b52f50ef299fb2

                                        SHA512

                                        bb3c06628bacf5ee58ad6815cc76ff80356d688f7ea2a53f53145f481f48f8fa53b05bc81401671665d3ee4c1b17170efb3fb196409dd19fc45e8382666f15a9

                                      • C:\Windows\{BF789289-3024-45b0-8361-03C9B687E79C}.exe

                                        Filesize

                                        57KB

                                        MD5

                                        b70d63b128de74434b195f4db5d48b6e

                                        SHA1

                                        49a078dba9b86cab303b0856a830db9c3d110d6d

                                        SHA256

                                        e9c74330b356c458bbb187a14be77f33864c6a1650c5243fed59e06310ce1466

                                        SHA512

                                        22c3731315c1bceed0185d12af9e6b8fe9ae5e383b5e5e7dea1913fb70487dc8873bfc82ec283cdd7528963c287290e41e16a59bc0f27e2a41932c95e5a81f0b

                                      • C:\Windows\{E1FD9F42-1F1E-47c7-B74C-CD121F593F31}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        d0224afa0587d85fd480c24df64423dd

                                        SHA1

                                        a30e862e652acab58cc7f86b318312a8e0f5914b

                                        SHA256

                                        35b71458ab9b23558d8975dae70f554a4b0f1ea30dad95b427f3747eb4d0425c

                                        SHA512

                                        171934f80be45a57d31dd7db43b4f75fd98b81eed9ddbccfd02380ef4e3f3bfa37242d278e447066c873ef9d9853208bb7496079d232a4e658b16bb3ffc82b07

                                      • C:\Windows\{EF069C89-279D-4321-BFC5-60742E2C1114}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        c6272501c75442f158884aa02f6d5f8c

                                        SHA1

                                        28b3fa63fbae2f608bb03061ce2f197b29cd5e89

                                        SHA256

                                        778c4d8c7bc49486f8da29fe6c60738cf67b6c65753a1d6dc920ebda32685fa8

                                        SHA512

                                        f47468cfe7a3eba1a3c0b87137034f24fb687c5852d2a37391639d1b8a1c56d3e470e1216a338d05f7400ab3ab3479f21bee14c5394c25aef03b9910f2bb1590

                                      • C:\Windows\{FB598076-152B-41a3-8E02-0E5DB7E8B305}.exe

                                        Filesize

                                        168KB

                                        MD5

                                        574fd40b3a50529460eda4aa67427d1b

                                        SHA1

                                        3f17428e086faef8a02b92b36b06a610a481bf07

                                        SHA256

                                        c14a536549c37ae201efcadc0428b0d18d4a1e8e6bb3addf428bb11d72f0d3d4

                                        SHA512

                                        917fa7add25d81e0cdaaa072d7f3f8e538c7efc5e2c19b0f9b9172b0aa8fa81bbba8767c88c2ec70b6aa92847a3b1279b26b64eef912a3a15cbbeaea726ac6eb