Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 10:08

General

  • Target

    2024-09-01_70bacdfad3ffce7f28f999b5ac6a0347_goldeneye.exe

  • Size

    168KB

  • MD5

    70bacdfad3ffce7f28f999b5ac6a0347

  • SHA1

    ca088c24a900ce0fd19de5154a48c7199146c220

  • SHA256

    b9f3ae8bbdb8b627eb41e526bfa4675d3766d35cabd0bcb0d62be775aefd371b

  • SHA512

    a12fb3dc21d3dd1fd540c1e423dd789375dbba3b745af52518a2dfb4e068a1d208b8672bf814a4ec72e3e6e044fba1d20c1e3ade9637689ccc8c93a9a143988b

  • SSDEEP

    1536:1EGh0oElq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oElqOPOe2MUVg3Ve+rX

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-01_70bacdfad3ffce7f28f999b5ac6a0347_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-01_70bacdfad3ffce7f28f999b5ac6a0347_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\{D7B7CF9B-3459-4710-BDDA-D7AF09FFD946}.exe
      C:\Windows\{D7B7CF9B-3459-4710-BDDA-D7AF09FFD946}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\{E7985238-BB4E-45c4-A280-FB40D786F7AD}.exe
        C:\Windows\{E7985238-BB4E-45c4-A280-FB40D786F7AD}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\{95AA2D9D-E921-4153-A747-F41A3E44AE7E}.exe
          C:\Windows\{95AA2D9D-E921-4153-A747-F41A3E44AE7E}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Windows\{4E3B6022-4022-4e6c-A283-0BB765A7D168}.exe
            C:\Windows\{4E3B6022-4022-4e6c-A283-0BB765A7D168}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Windows\{413B90F7-870B-4b24-9854-7B0E8598141E}.exe
              C:\Windows\{413B90F7-870B-4b24-9854-7B0E8598141E}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1464
              • C:\Windows\{B7D28A6B-7C06-4b9c-BBF8-DECAD527B76E}.exe
                C:\Windows\{B7D28A6B-7C06-4b9c-BBF8-DECAD527B76E}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1136
                • C:\Windows\{6D015C82-F68E-4bf4-8C63-228BFABE94F6}.exe
                  C:\Windows\{6D015C82-F68E-4bf4-8C63-228BFABE94F6}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1672
                  • C:\Windows\{6AD04D8D-7D96-4327-AB74-8791F3953659}.exe
                    C:\Windows\{6AD04D8D-7D96-4327-AB74-8791F3953659}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2928
                    • C:\Windows\{DDC3F1E7-F3AF-4ca2-8827-EF7000ED8B03}.exe
                      C:\Windows\{DDC3F1E7-F3AF-4ca2-8827-EF7000ED8B03}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2968
                      • C:\Windows\{718A370C-446E-4644-BA4A-90C2E11481FB}.exe
                        C:\Windows\{718A370C-446E-4644-BA4A-90C2E11481FB}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2556
                        • C:\Windows\{B5028FB5-068B-4ae7-B582-E3735BBEADEF}.exe
                          C:\Windows\{B5028FB5-068B-4ae7-B582-E3735BBEADEF}.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1028
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{718A3~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:3012
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{DDC3F~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:2228
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{6AD04~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2300
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{6D015~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1928
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B7D28~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:580
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{413B9~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:304
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{4E3B6~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:264
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{95AA2~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2620
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{E7985~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{D7B7C~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2752
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{413B90F7-870B-4b24-9854-7B0E8598141E}.exe

    Filesize

    168KB

    MD5

    0102632528ac552b2ebd687781b29cf5

    SHA1

    991115f888b3780190a7c46d1254838473b33d3d

    SHA256

    00d9c4bbad7c999e2cf038ce3e8d648801d4eab416d17ead1c5f59a6bdeb23a9

    SHA512

    e2ca025a0546f05fffcfde97e7ad31e156f4db68eee84b67ff9040f35eaada2462b25d621fc39d36934d61062de0f8bc3a2bec253974249a50b9b3461231ace8

  • C:\Windows\{4E3B6022-4022-4e6c-A283-0BB765A7D168}.exe

    Filesize

    168KB

    MD5

    ef6b2f5d5b41b31ee2cbee674d462e03

    SHA1

    5c4cc3f7057495113ed251b4738d2bf55a2b90e8

    SHA256

    ca31aa9867b3bcfc70f80c04af2616b235d75e7088e5dfda31644e664d9abaaf

    SHA512

    dc7947aca6bc23f5a767ab87cc31634c218a5861c0caaab524a89cc863da93c7b1cdbc9e9825e6c721405c2885c1927cb44c036185e63c22784a5f9f7f38eb16

  • C:\Windows\{6AD04D8D-7D96-4327-AB74-8791F3953659}.exe

    Filesize

    168KB

    MD5

    5bcb42c88b99d6146c43956e86a588a4

    SHA1

    b1cdc56ca8d1a5840f5d0a052933db16df4304d6

    SHA256

    b90cab5586ce024b8dc68387712f89a2b5b7527e9097c8a367e79261511fd938

    SHA512

    11467611a542f92955784409487e5147139b7b9f465a51e70d0bde44bd7bcb74520b04a22a8f332cb0afa5278aef5b1e22f44bde576ed2b77065647cee0395ce

  • C:\Windows\{6D015C82-F68E-4bf4-8C63-228BFABE94F6}.exe

    Filesize

    168KB

    MD5

    3e233de587349ed4d12f4953584abb3a

    SHA1

    c257ff54935dae05188bc369263d9c9dc69f833f

    SHA256

    68d30242b369f4d849bf79f1ab52f28d9bda2023411be138eba9e2994bf3b737

    SHA512

    f8b9b6e36e16c7bc34f375cb16e889130e5ec4f5401407b9d786c09241ba7047dee42ebd1c7620ff08dc158bd4d8e4afa3c94bb594b4dd6e9f35a5f06cbb0ff0

  • C:\Windows\{718A370C-446E-4644-BA4A-90C2E11481FB}.exe

    Filesize

    168KB

    MD5

    068317baa8ce6058b3a7326356a8fcd8

    SHA1

    3a4c8532a06389ebb1bef3ed63fa2700e7a88223

    SHA256

    578502e411592e4df68c56343157dd273fafbfffd810b093775ef15f1cef2bf6

    SHA512

    47cd3c92d9bfe342b256d3efc83e991102439877881042ed9dc40aaca007a63ee3e29d99606fe7b8eab6855570770a267ea7bf8c45c14e25253f24716c2097c7

  • C:\Windows\{95AA2D9D-E921-4153-A747-F41A3E44AE7E}.exe

    Filesize

    168KB

    MD5

    086505988d6db48f68e31ff69cfc39fd

    SHA1

    11489af4302dde4efb3c01e499eefbba87efc5c1

    SHA256

    a0121c4ef90b957919221360c1bbb5c48b7fe38d69981caa02ce40aa74cae365

    SHA512

    a18dd3b8fc4d5ab3d40d87c781708678422fc1b7248dd6c89d6b867b279015e228f4dea2ac2f98c69c7af4f2ff522662fcf8e960c14a577bd5c7095619e9fb58

  • C:\Windows\{B5028FB5-068B-4ae7-B582-E3735BBEADEF}.exe

    Filesize

    168KB

    MD5

    78d8f57917aa18e5f15c951a5441012f

    SHA1

    92bf4a0f065e8a84cd70b3b72ce2431632769422

    SHA256

    9ae2a8d4ef37a85f91e657170eba4d7215b863604378c5e63b3f9cebfa32d4c5

    SHA512

    c2f23b5920a68124e5cdd08f0a07f3a8cda0b778fe1be3a42cdb34550e49a8ec3dfcb3c8237fbb9c4350138684714377fb2330e2ec93f90fe961c54e522f9493

  • C:\Windows\{B7D28A6B-7C06-4b9c-BBF8-DECAD527B76E}.exe

    Filesize

    168KB

    MD5

    037ff481d64d7cba6d33290eca5fb938

    SHA1

    a8b736198d64ce728a3028a5872e2e44ea494483

    SHA256

    85eac098ea881c87243ae085a5c9a812036f34b61a6c58373a4d00db02d1c677

    SHA512

    2f2c47590adf444acb2e44acf34f4ea0dca86599c1bef88b27b501769f595411f71a6a0f6fb078ea501d0f9402ad8cd56ccf3bae3bede05c25d137c0c4b2cd95

  • C:\Windows\{D7B7CF9B-3459-4710-BDDA-D7AF09FFD946}.exe

    Filesize

    168KB

    MD5

    dee64dfdf786dc96afb69a66dc26295d

    SHA1

    c4043459bdd0622dc4feaae372a53f921cb4c710

    SHA256

    0ca1603b7838e5ac49f02a11690d985903c0b2325a67886d5422fd28cc848e49

    SHA512

    5150934ffcc016276d7b12cec2b3e55c019afc4da1efe14acf3b3eca1be0cc23446c55e2e61f6a541e05180bad27d840b5dc26628d52d535b992424773b9989f

  • C:\Windows\{DDC3F1E7-F3AF-4ca2-8827-EF7000ED8B03}.exe

    Filesize

    168KB

    MD5

    c6cd9c3a4aaa04d48752c401ff27dc77

    SHA1

    4e83b6a16f99025b8f23ac48dd53d47922d924db

    SHA256

    05b99c5fc585a71876d5b3ff86a3fca577103cf1eff10728cbbfc5c6353121fa

    SHA512

    ad7687ef082772e1965668be63eef71c9bdb15d60d6a94bf0450f1e54b1191bc0656b00048d7d97b55a4c153d550a822263492fe9ffe3ec6baf7df21643f9ce3

  • C:\Windows\{E7985238-BB4E-45c4-A280-FB40D786F7AD}.exe

    Filesize

    168KB

    MD5

    f3d04b844e80084fee83301320bd9b90

    SHA1

    0daa3e91194ce05b855bb571435255bf8c279447

    SHA256

    97b46c0e60c9886d1d9c8a6ac5f6a62c21a18ae3320bcd10797bebde618e3d5a

    SHA512

    865dd413547478aa512271b2cb7f5cef1585b3bd28d9957eba53569c6851b1998b15a06a9acbd778596e44befc74de881fd9e68174b8ab74ef23dc63c469bdb5