Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 05:47

General

  • Target

    2024-01-01_9a554f469ee6836fcb5000a8d12fa50b_goldeneye.exe

  • Size

    408KB

  • MD5

    9a554f469ee6836fcb5000a8d12fa50b

  • SHA1

    e29170acb8ae53da2bc5f337e7f6d11d2a4035fc

  • SHA256

    c7316dbb2db1a4c7aa258c92b71648665031d157249bb27300ce466e6ad13f8a

  • SHA512

    e62d68a622dcfa001e7411bfa10f0e8f03cb552b549885ed5b0370ec733f056702a834563b7a6cc985982d4b128b50537a9a2683d22f86e3b28a52d394926aa0

  • SSDEEP

    3072:CEGh0obl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGdldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 12 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_9a554f469ee6836fcb5000a8d12fa50b_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_9a554f469ee6836fcb5000a8d12fa50b_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2708
    • C:\Windows\{CBC659A5-B2E9-4f6f-8081-FC5A12417989}.exe
      C:\Windows\{CBC659A5-B2E9-4f6f-8081-FC5A12417989}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{CBC65~1.EXE > nul
        3⤵
          PID:2764
        • C:\Windows\{3B947B58-0270-4b39-81AC-AFA81AE117EB}.exe
          C:\Windows\{3B947B58-0270-4b39-81AC-AFA81AE117EB}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{3B947~1.EXE > nul
            4⤵
              PID:2752
            • C:\Windows\{7658FE7B-AE10-4782-B111-CBFF012BB09A}.exe
              C:\Windows\{7658FE7B-AE10-4782-B111-CBFF012BB09A}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2856
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{7658F~1.EXE > nul
                5⤵
                  PID:1964
                • C:\Windows\{9B5A2EAE-D68A-4626-B667-09B618E6638D}.exe
                  C:\Windows\{9B5A2EAE-D68A-4626-B667-09B618E6638D}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3064
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{9B5A2~1.EXE > nul
                    6⤵
                      PID:1300
                    • C:\Windows\{DFB18FD6-0FF9-40dc-A53E-FB455EF471E2}.exe
                      C:\Windows\{DFB18FD6-0FF9-40dc-A53E-FB455EF471E2}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3044
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{DFB18~1.EXE > nul
                        7⤵
                          PID:1960
                        • C:\Windows\{F31187A3-85ED-44b7-8B01-9BB9CEDF220C}.exe
                          C:\Windows\{F31187A3-85ED-44b7-8B01-9BB9CEDF220C}.exe
                          7⤵
                          • Executes dropped EXE
                          PID:764
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F3118~1.EXE > nul
                            8⤵
                              PID:1696
                            • C:\Windows\{296436AE-7767-4eb5-B4CE-3FC0768300A5}.exe
                              C:\Windows\{296436AE-7767-4eb5-B4CE-3FC0768300A5}.exe
                              8⤵
                                PID:1896
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{29643~1.EXE > nul
                                  9⤵
                                    PID:1820
                                  • C:\Windows\{CAA9EA2D-294C-443a-8949-9B949F561731}.exe
                                    C:\Windows\{CAA9EA2D-294C-443a-8949-9B949F561731}.exe
                                    9⤵
                                      PID:1532
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{CAA9E~1.EXE > nul
                                        10⤵
                                          PID:2848
                                        • C:\Windows\{0E41F903-1038-4e9d-92A6-DFF4901ED253}.exe
                                          C:\Windows\{0E41F903-1038-4e9d-92A6-DFF4901ED253}.exe
                                          10⤵
                                            PID:2288
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{0E41F~1.EXE > nul
                                              11⤵
                                                PID:324
                                              • C:\Windows\{65B4EF43-464C-4295-8190-9E067BA43116}.exe
                                                C:\Windows\{65B4EF43-464C-4295-8190-9E067BA43116}.exe
                                                11⤵
                                                  PID:2116

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{0E41F903-1038-4e9d-92A6-DFF4901ED253}.exe

                              Filesize

                              53KB

                              MD5

                              41e7a2e9ebd22e81c7fd957a8f9c9432

                              SHA1

                              d163d4adbdd625f0b0ca379c2d064ddb5cbbd864

                              SHA256

                              5f85968be89ef594e95cdad705f6576a6773aa287a75d6fdf067f42932cc612e

                              SHA512

                              5f331c0390843d56aeb118e4c8ca988e8e3ba11c61767481ad74fa5193459bc73de6fea548a533c78dfae5999b457305bb3ac71d5f9f8a1f31b5f8b90d16d022

                            • C:\Windows\{0E41F903-1038-4e9d-92A6-DFF4901ED253}.exe

                              Filesize

                              14KB

                              MD5

                              bd799d9e224b68ad428ff0cd303b2dd5

                              SHA1

                              7b22d9e420b04286c0b34442fe925f969dc266ac

                              SHA256

                              9a15f37a068a5e257928e4eb342d2de116b04dbb77efd6211f19a5ecf14f9c4b

                              SHA512

                              2935e50c7a6e6965c578db6afbdde0e6bf22d7dcc6e77dd60ae70ba4e58ef6d753bce66e767483ce9d6024d98b63968ac7366d55c44483885686807f25e1515f

                            • C:\Windows\{296436AE-7767-4eb5-B4CE-3FC0768300A5}.exe

                              Filesize

                              38KB

                              MD5

                              8ea7bd4f088eef418474bff5f45fcc97

                              SHA1

                              d551d3f09bd7f6c66dbddc84f82de39ee70298b1

                              SHA256

                              ae933444193640c7ae8181052a6cd17095d309da41f63c71bba82be99ea13448

                              SHA512

                              961e0491230ecdad6201fdf794b4f0e8a7af509e18580fe04ac007f4c6d717ee8244d55690e9f60df0916d9ed45dffb0c6d75c251c6923f6153cecfd78b4609e

                            • C:\Windows\{296436AE-7767-4eb5-B4CE-3FC0768300A5}.exe

                              Filesize

                              35KB

                              MD5

                              f38d10f88fc20348feb7387768b6514c

                              SHA1

                              7c0a9c5520f693ae3909da3ead4ff1a22d9aedb8

                              SHA256

                              30955536f4ac1385915f6c123ba29b8c8f2b3eebd8e00ad35e8b8ebd799baca1

                              SHA512

                              599b3c29886f0d8cb266515ffe98432b06eebcd7015ed08bfddd47ada893427c2891312289ba19d957c276b6806444b130dcd11741faeb7556b0a4a189934d15

                            • C:\Windows\{3B947B58-0270-4b39-81AC-AFA81AE117EB}.exe

                              Filesize

                              408KB

                              MD5

                              88526b539e59400892d5c1000ab7225a

                              SHA1

                              4244a36d50ab5722aa734e2891af7f65b9e71fe3

                              SHA256

                              61bfd9c8a918affb9842d822a61a1a56b6a5c889d7d03eb38729acd1a510ba3b

                              SHA512

                              daac16d34784bc894923b52283149452fb679d555d6b23aa1c8efb073104221901689e2dc90462d837d27632f23ff07152557a8220de09acb3cca354508d48c4

                            • C:\Windows\{3B947B58-0270-4b39-81AC-AFA81AE117EB}.exe

                              Filesize

                              12KB

                              MD5

                              af5455b20b89e12cf710fe70ddbc708a

                              SHA1

                              1297f910e36fe3af2bedfea487f2141e193052bb

                              SHA256

                              e98ed1cd57564e6e2d3707b0d220920ffea1e258b66ebd7416b4368cfc724903

                              SHA512

                              3500ad8cb4cf589dae211cb7406fa760f909953fbdc22c50d996e3c10f958f90ad63d26cb3da030a44fd7021e7b1bbaf5decf0407d140255e498a907f3f7a0d6

                            • C:\Windows\{65B4EF43-464C-4295-8190-9E067BA43116}.exe

                              Filesize

                              15KB

                              MD5

                              a4ff05c72c5f52d4783fe7fd6c8540de

                              SHA1

                              80c3019aed56205d0825cfbc9d60e26ff053ad90

                              SHA256

                              ef0ba61a896e187c4cc8172f140fa41acce0651669c9c5b3bbf3207d88a91d8f

                              SHA512

                              aa6f718024b55971d170a7f5cd6f957497c2e146bd1a2c098b9dff57c4034009e83e5ea64ce390ba57ce7b06794de8c3b4f511c1d5587990a5415a003fdd059c

                            • C:\Windows\{7658FE7B-AE10-4782-B111-CBFF012BB09A}.exe

                              Filesize

                              26KB

                              MD5

                              aff0debc8f5fff617cad4453996ef6d8

                              SHA1

                              9ee6ed352ef3d0eba5b970bc4eaf596a537a6b07

                              SHA256

                              851f6aaecd882151df4634c6b628da04a89b2a35bac8eab9da7e0dd48f3a4a9d

                              SHA512

                              0cc2a44d5bf50d8c96d9529645c9929730e85baa953445232c791c8b822866626f92a298819f8647ec9d2c96500a88689f3014156626b60543b5b95406628c6d

                            • C:\Windows\{9B5A2EAE-D68A-4626-B667-09B618E6638D}.exe

                              Filesize

                              33KB

                              MD5

                              cb4f96ac664f03bf0c27005f8c03015f

                              SHA1

                              0d10f7f16ed7139dd1b6ebdafaa8edffb4a6dda1

                              SHA256

                              58e3af4db02ccf8ed654402b4cc29cd269267a8a3e2836f9366c6e39496378fe

                              SHA512

                              dc50e3d3f3f2c4d0f4a011b5896f85f85a6688787deeeaf73b4010c4cf2f8d136981570dc34c6381fa22f90dd44b62322a67a9c5573c1b079984e22413195f4c

                            • C:\Windows\{9B5A2EAE-D68A-4626-B667-09B618E6638D}.exe

                              Filesize

                              69KB

                              MD5

                              15e77ba4d898690dd8aec9cf395d91c9

                              SHA1

                              326679f257dda91ab4eb99488751545a5c071b1f

                              SHA256

                              fc0f7cb8a72986cd0a23657d191e8785755ec1e3a31e930ac85b09f78473ca89

                              SHA512

                              1f5c658d66ea02ece737b7f7e381113adba50280303c728171275bf11a9e0d3261e1dd817047b62ebe49484926bcb218affe1df87378b0eeedca252662be10c9

                            • C:\Windows\{CAA9EA2D-294C-443a-8949-9B949F561731}.exe

                              Filesize

                              34KB

                              MD5

                              694a48de0855ec99e093d74d3dc6806a

                              SHA1

                              79ab15aadb80d5dc2638d599eceedaf2fc131ed8

                              SHA256

                              89492e9844b365b7449668efb1c3ed5caf6acbb3a61a46c7a5cd3a3e016bf696

                              SHA512

                              4cf61381dc0704f4e85a75afea4567de65c78005a8e4a715888333c2c086f65ad8ea15368486441658c5cb76c3632e99d53282ce8186b5c2db6a76078a834e7b

                            • C:\Windows\{CAA9EA2D-294C-443a-8949-9B949F561731}.exe

                              Filesize

                              51KB

                              MD5

                              f969bbcffc9ff4b0d8ae1633a6c18f71

                              SHA1

                              3626cc17d621cee6f4f5d6c02255533f892f5887

                              SHA256

                              86ddd97d6967ef2c2d15f2d01293c65f125bee078d169286f2d04c238295c949

                              SHA512

                              946c57836af4913ab6ac3c6bbcb2b93fcd3046aa906c4bfdfba262028eb83cb3f8755f933106ea3d73be1d32a65b9c1b56a5c8def9f64ba79e2444ba06bef094

                            • C:\Windows\{CBC659A5-B2E9-4f6f-8081-FC5A12417989}.exe

                              Filesize

                              5KB

                              MD5

                              897f8900e6a2d2ca951117cc3b95f422

                              SHA1

                              409736eda0ee5cd7dfd0c2396c4725a031291055

                              SHA256

                              28b32be9ebce1eb87e5158906c1bf60ab7ed65498368309a798fed8eaea8cf8d

                              SHA512

                              6e56f2d22a6e32a1eeee2a7140ad258aa3499d45f22f2fd45d6be739db5eff66317e1ca8db430fccf0b5c3de27dda635f64ec9442eb89e52a265b572891b2bd5

                            • C:\Windows\{CBC659A5-B2E9-4f6f-8081-FC5A12417989}.exe

                              Filesize

                              30KB

                              MD5

                              cacd8e619336285b1553036607fe8dc5

                              SHA1

                              84c14f962f57a9367519a32d50500b4c8b927cd2

                              SHA256

                              54b81413535bd49b90c45f0dfc8131a8de810b463065aa462d91bd69a10e261f

                              SHA512

                              3bf90da9de0ee7cfb5004ed146a7a85f52bf37fe33206f75f3f8479593977a0778f255e66f81f50735ab23f4b53e8568a804fc70813a83d565f64a93c97ddbbc

                            • C:\Windows\{CBC659A5-B2E9-4f6f-8081-FC5A12417989}.exe

                              Filesize

                              408KB

                              MD5

                              2d81f35662a6fe6e469bd5d0210df5ba

                              SHA1

                              404743855152702c59fdce2f19c340aee8a9772a

                              SHA256

                              67d1f7975f5fb2d1a766490cdda966aaa7d831c898fe6ce17086c9cf71bc4a32

                              SHA512

                              97181c665cfa75988d8a03bacb93d68d876eb0da87e979e6a4688a4f5a5cf2e0138874b465f97437ab08b923905eb8efeb16834e1e23b43399851e29917b7fa6

                            • C:\Windows\{DFB18FD6-0FF9-40dc-A53E-FB455EF471E2}.exe

                              Filesize

                              23KB

                              MD5

                              606ac3a7c7110d5ea6a6049a648ce67e

                              SHA1

                              7fe6f7c42129ec6c7d85a6de9c4b5f1e38972e95

                              SHA256

                              ceced150c05d98a2ebb6a2d1bc1e518f5994318db54d2515769a89b6f816e19c

                              SHA512

                              3f8ad148f376aec59044b2504c971110210a86e7225503f44dce02f4c9858ca44070fe57a85264ab27a02a10bae2490a6aeeecc1291a5db68172d559baf69997

                            • C:\Windows\{DFB18FD6-0FF9-40dc-A53E-FB455EF471E2}.exe

                              Filesize

                              1KB

                              MD5

                              e390d5e1c9a5f95b99521de37c76e69b

                              SHA1

                              37cde85109a08b3b0d68aef382e00b09f3768e2d

                              SHA256

                              80ca884b931bb88ac3c9c819bf370704a34239361066e032d31c01fe2e1ee4c6

                              SHA512

                              fad1ef08769adc38455e2b5a614e36854b41144719f164202398888d97d387dac4c98de29088b222fb2756fe416ef6deb4fdf88649aa55ea91de4927542f8e69

                            • C:\Windows\{F31187A3-85ED-44b7-8B01-9BB9CEDF220C}.exe

                              Filesize

                              24KB

                              MD5

                              6ecdb84d1ac85929ae28ef6a85eb8319

                              SHA1

                              e014473e38945f432185f45efd5e08c27b879552

                              SHA256

                              a7e4540cfd5b44f9a6575d8e42069e5a32e37e49cd59d55939945bb178f70409

                              SHA512

                              af034fd10d38e32e1112b2939cc791ce2954a3a327753a3ac4df43a5f411b7dfb3bfee30fc7df5d1d9a7fea9f88a9d4428a5723ea5e0cbade1c9050819006541