Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 17:19

General

  • Target

    2024-10-13_ddf66f847efb952dfc45da6bb0019ce3_goldeneye.exe

  • Size

    192KB

  • MD5

    ddf66f847efb952dfc45da6bb0019ce3

  • SHA1

    525915ef98b50cc33373264c7789f53a7b939400

  • SHA256

    5496e8b82db8c3dcb9c9ec696e95cee1e44b64b858dde2e4982edc88c744d5cd

  • SHA512

    9e763f7a4d0a1555b55203f1ab52f79d8a9677bfc819005ed2910347aee93c9a76d1d4bdbf52ad97c61c65628d5143f69e6531e0dc923ada9349f15ab16817c1

  • SSDEEP

    1536:1EGh0oel15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oel1OPOe2MUVg3Ve+rXfMUa

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_ddf66f847efb952dfc45da6bb0019ce3_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ddf66f847efb952dfc45da6bb0019ce3_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\{E8F4492E-0C33-4bb3-9C5B-729E7CDC985A}.exe
      C:\Windows\{E8F4492E-0C33-4bb3-9C5B-729E7CDC985A}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\{722F9260-DB82-4a71-8007-0C15E6F14816}.exe
        C:\Windows\{722F9260-DB82-4a71-8007-0C15E6F14816}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\{802DC485-88E2-4d1d-B8D8-00816FB6A1A3}.exe
          C:\Windows\{802DC485-88E2-4d1d-B8D8-00816FB6A1A3}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\{994BCAD0-2B06-4452-9E69-D030B6F0BBBF}.exe
            C:\Windows\{994BCAD0-2B06-4452-9E69-D030B6F0BBBF}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1056
            • C:\Windows\{9DB508D6-95FC-42b8-8C81-7A88CE090809}.exe
              C:\Windows\{9DB508D6-95FC-42b8-8C81-7A88CE090809}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2460
              • C:\Windows\{9158619B-5DE0-4980-99BE-9FE77ACB832D}.exe
                C:\Windows\{9158619B-5DE0-4980-99BE-9FE77ACB832D}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4408
                • C:\Windows\{524E5AD7-AAA5-4c1d-B276-53CF56D36049}.exe
                  C:\Windows\{524E5AD7-AAA5-4c1d-B276-53CF56D36049}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3392
                  • C:\Windows\{C6516017-9179-4ed7-A460-D286B5286073}.exe
                    C:\Windows\{C6516017-9179-4ed7-A460-D286B5286073}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2108
                    • C:\Windows\{965D17EA-B1AF-43d5-B3BE-5B585F293177}.exe
                      C:\Windows\{965D17EA-B1AF-43d5-B3BE-5B585F293177}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1924
                      • C:\Windows\{5B5F5AB6-BB44-4c7b-A747-0CD8062C4639}.exe
                        C:\Windows\{5B5F5AB6-BB44-4c7b-A747-0CD8062C4639}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1480
                        • C:\Windows\{5C214E81-A966-450d-87D6-2FF48E9CA332}.exe
                          C:\Windows\{5C214E81-A966-450d-87D6-2FF48E9CA332}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2568
                          • C:\Windows\{301E0122-74A7-49c9-BEFB-F9A83F400741}.exe
                            C:\Windows\{301E0122-74A7-49c9-BEFB-F9A83F400741}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3200
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5C214~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:4304
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5B5F5~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:4564
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{965D1~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:348
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{C6516~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2768
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{524E5~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3304
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{91586~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1980
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{9DB50~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1484
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{994BC~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1160
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{802DC~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:244
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{722F9~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2200
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{E8F44~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{301E0122-74A7-49c9-BEFB-F9A83F400741}.exe

    Filesize

    192KB

    MD5

    44a75e6337625681be890a7c0cb86bcc

    SHA1

    79412612cb741dd38e85af61c89342112e4dbdfa

    SHA256

    de942efb3b241cf6fcc6435b236a02a8689e122d72b67180de5dcffa3222208a

    SHA512

    18d899799bcb504272da2b72658fee7da7b94f39c145db0eb46c1f1d814af7fb5c1955d724bd0e3abbb5f89cb162869b0e2ac8b8ff35991acb05dc13403b8c93

  • C:\Windows\{524E5AD7-AAA5-4c1d-B276-53CF56D36049}.exe

    Filesize

    192KB

    MD5

    44a944ecbca5d2ea47d3504dd44a0097

    SHA1

    23efd5f86866f56a530579dbfdee1aafab50ead9

    SHA256

    18ca9b2593604da645bb3cf5c24decfaa536dc56060a6957825d1d6afce2ea86

    SHA512

    68325ab4fee229db3adea5661839d92bfc456ba60d57f95bab919357f98cb8c7999fd118f73c2f7a09e811b4afcb2cc2af83bba60f76517ce284ad0a0be6fb10

  • C:\Windows\{5B5F5AB6-BB44-4c7b-A747-0CD8062C4639}.exe

    Filesize

    192KB

    MD5

    8c4660da31c730a0fac7fc3993e79ec7

    SHA1

    b936e89350764a42319bfcce4843795f30fcea85

    SHA256

    a941c6419523a73e2eebb125bd1adc9b6d97ec2a54b5ecfb0a4d13ab5331a643

    SHA512

    43b8ac70833813a09f440cf3934ef473dbc7d4a33c91f832fb1e8cde3d5b689249a6f02b67628c534cf9fe7ded24c7558045d9d771adc8bf78109f3ec8aab49f

  • C:\Windows\{5C214E81-A966-450d-87D6-2FF48E9CA332}.exe

    Filesize

    192KB

    MD5

    065da7266881a859ab2f875cae7f0dbf

    SHA1

    8a3faf481fbff74ecd03b4a9011dbb9971b3919f

    SHA256

    3b7456bc46a4895d5d1754de7f8bbd0789a3476ee0d8e0caf3fde4d23a8e148f

    SHA512

    5089117b3b98316d0541f200d9f162d2cb677956ce487179104a935a5ae27095e4b1bf2a7653738c871b37b44659e5610299f540ff653073f09e9622e1b0c7a0

  • C:\Windows\{722F9260-DB82-4a71-8007-0C15E6F14816}.exe

    Filesize

    192KB

    MD5

    851ccaaa1e45585a3e120d7e65f1a93c

    SHA1

    e859b4c313fb0dfde056e9e6a61567b8ec2d85f4

    SHA256

    1c8ce1e564dac8fca1c367191c3ca1e33093b6887692c32db87ee859035a552d

    SHA512

    d926ecc6cc6c9b60a8330c23e0811074d9a6d247f9f511ab43c6cce14fc0860655974931925b19ccf9935cb187a5917634350673c22874b5ce2e34a31b56695d

  • C:\Windows\{802DC485-88E2-4d1d-B8D8-00816FB6A1A3}.exe

    Filesize

    192KB

    MD5

    42fe536ee04d860fddf801a868a3133d

    SHA1

    28a2cfd8fb0468dbfbe2d7a9842c31534fecd062

    SHA256

    e89c011e26917868b97fe7c71869798831221951ff10438a543db3462ebf1d60

    SHA512

    3985d2309c05b4c53f21a24f630c89266c761156057d6db5ab3130f31a1f237309226dc3257c907b16fcaa10c1ff0e9865396fdd4c9d7c15a3a7f77de2bcf839

  • C:\Windows\{9158619B-5DE0-4980-99BE-9FE77ACB832D}.exe

    Filesize

    192KB

    MD5

    c2fa5033e0eb01839ee9f861449c1ae3

    SHA1

    5a3bae67bccbbc7cfba622996265bd5327260b01

    SHA256

    656f0f93585f833aa7f0b991c8b75e95e2887a28d29b088fd1da44c8e90f9d85

    SHA512

    f113dd3ccd915aac44b92012b14e4e96cf688bc2f5d8ebc30fcfcb1094f6f490255f13e322d302efa8b0927e99bd54fc60d96f5208f94fa528468e1f908c0dd7

  • C:\Windows\{965D17EA-B1AF-43d5-B3BE-5B585F293177}.exe

    Filesize

    192KB

    MD5

    576e708a5bb238cd377582e5a79f040e

    SHA1

    accf1a04e3bd8493ddf0de42db006b2f678c55c2

    SHA256

    35c65e542624352d6622926dbf6906e7938eaed74b468c671ef2c961c0004271

    SHA512

    5dca4e9b7cb9286a9d8e1e5cf60589611af5e4a581a932cad1487009248e057fc77bb904e8491624eeb1d3423f45002369cc69d64143224cbd83034231349d71

  • C:\Windows\{994BCAD0-2B06-4452-9E69-D030B6F0BBBF}.exe

    Filesize

    192KB

    MD5

    654991e6f4339687f5a25a3d627648aa

    SHA1

    016958f52d77a58d2aa142c5b4eb6c70cf34f0c1

    SHA256

    9acd61cd470380e105798608a7b3266c9d0f1b4c36b5d5af896d6660ecc4375b

    SHA512

    9549444f29896dbdf886ab4a9be75922f4535e359852d50e8ddc614e212a0d0f57736362d5b48d0ec31ee2a32513e494f6679bcdc8c5d0eda8e60a6e0760261f

  • C:\Windows\{9DB508D6-95FC-42b8-8C81-7A88CE090809}.exe

    Filesize

    192KB

    MD5

    1c040e53b4b62fcb25adf9b78c421ab7

    SHA1

    ae76e0ab41670e66cd121d58ae28eb6ed10562c3

    SHA256

    7727213194b27769b0c73d283dd0536d89d7a205c245fda7edd5cf3db561411a

    SHA512

    662f563a16a397b2f0991bc9297486927a0608a456ed923c018b9bf2e55a5db3a8a0d93375719f9dbc3cf869e13fb3ac7e15b4d0ed6fe2e40e330b7645154d01

  • C:\Windows\{C6516017-9179-4ed7-A460-D286B5286073}.exe

    Filesize

    192KB

    MD5

    8a2324c8d34e510903e38f6c2d4b8d43

    SHA1

    6394cf3d894a4e114ec1a03f9d3672899120d24f

    SHA256

    0e250e604c9947fe2e955b01584a07cf14efd8fb1e4bfc60c3bdcbd902bd945b

    SHA512

    01b4ab116b00e6a1cb2316b6d60848f97e7f9b0117d641c4e596b7627ef874dee4f8e31a5ad232ef5b5ceff5951689c6307ab6c0c66035efc07359277db43057

  • C:\Windows\{E8F4492E-0C33-4bb3-9C5B-729E7CDC985A}.exe

    Filesize

    192KB

    MD5

    d72e6f64fc6dd18abaa55c8b81c0ff19

    SHA1

    e556324373369bc18901eb0ac13f86562adc05b6

    SHA256

    7ce4fbaed54362bd7a5d9f8e49b623c35171c2675bde8886f806a880cdacb8c2

    SHA512

    8425e8344235df7bc00decd35edcf8fe61c09781ac2658fd88887570dbc2f780f5f3172d0951548147a799f38594e64b61cd69a66c182dd6a60ce68af4e53096