Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 05:51

General

  • Target

    2024-01-01_d7e69a63e912945cc826f7d2490edac8_goldeneye.exe

  • Size

    408KB

  • MD5

    d7e69a63e912945cc826f7d2490edac8

  • SHA1

    05fd197715f65b8e7de0a1028226817d11835bd6

  • SHA256

    5decc3f4172c8a1b785f0b0277bc7c4f19bc51ab61241b5a2492bea7ccb98ac1

  • SHA512

    a152928ca759cd211cb6bac01b0ae8701809394c07a13ed04f1cb8d53891c28bb22b0d64364bca46ddaaf9404937f6b032c01760c5be518cc92f0a75f296fb8c

  • SSDEEP

    3072:CEGh0o+l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGQldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-01_d7e69a63e912945cc826f7d2490edac8_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-01_d7e69a63e912945cc826f7d2490edac8_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2780
    • C:\Windows\{24B3A845-A050-49ff-8073-72D7BCC59B1F}.exe
      C:\Windows\{24B3A845-A050-49ff-8073-72D7BCC59B1F}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{24B3A~1.EXE > nul
        3⤵
          PID:2836
        • C:\Windows\{275EA193-FABA-44f7-A92A-90114514764B}.exe
          C:\Windows\{275EA193-FABA-44f7-A92A-90114514764B}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2680
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{275EA~1.EXE > nul
            4⤵
              PID:2560
            • C:\Windows\{5D81ACB1-0E1D-43b3-9280-8020D4BA549C}.exe
              C:\Windows\{5D81ACB1-0E1D-43b3-9280-8020D4BA549C}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{5D81A~1.EXE > nul
                5⤵
                  PID:2848
                • C:\Windows\{36840597-85F3-40da-95DD-16EA3C7E47BE}.exe
                  C:\Windows\{36840597-85F3-40da-95DD-16EA3C7E47BE}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:864
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{36840~1.EXE > nul
                    6⤵
                      PID:1420
                    • C:\Windows\{FDB7B724-AFBA-4b1c-8913-6C1E5202831E}.exe
                      C:\Windows\{FDB7B724-AFBA-4b1c-8913-6C1E5202831E}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1640
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{FDB7B~1.EXE > nul
                        7⤵
                          PID:1576
                        • C:\Windows\{1062C682-5627-4608-8B87-33D88C7960C7}.exe
                          C:\Windows\{1062C682-5627-4608-8B87-33D88C7960C7}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2160
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1062C~1.EXE > nul
                            8⤵
                              PID:1348
                            • C:\Windows\{30F2C737-CADD-4b4e-8B59-95D34513651F}.exe
                              C:\Windows\{30F2C737-CADD-4b4e-8B59-95D34513651F}.exe
                              8⤵
                              • Executes dropped EXE
                              PID:1196
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{30F2C~1.EXE > nul
                                9⤵
                                  PID:1684
                                • C:\Windows\{1A804D22-AAC9-497d-8310-EAF645889DB5}.exe
                                  C:\Windows\{1A804D22-AAC9-497d-8310-EAF645889DB5}.exe
                                  9⤵
                                    PID:1176
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{1A804~1.EXE > nul
                                      10⤵
                                        PID:1992
                                      • C:\Windows\{07FC312D-5582-4d1f-8D57-BF8BE79B0F53}.exe
                                        C:\Windows\{07FC312D-5582-4d1f-8D57-BF8BE79B0F53}.exe
                                        10⤵
                                          PID:2020
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{07FC3~1.EXE > nul
                                            11⤵
                                              PID:584
                                            • C:\Windows\{346444FA-32E7-48b0-824E-F754A3A52B40}.exe
                                              C:\Windows\{346444FA-32E7-48b0-824E-F754A3A52B40}.exe
                                              11⤵
                                                PID:488
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{34644~1.EXE > nul
                                                  12⤵
                                                    PID:1740
                                                  • C:\Windows\{CFEED0E2-2B43-431c-BEE8-3DBCDD10F09B}.exe
                                                    C:\Windows\{CFEED0E2-2B43-431c-BEE8-3DBCDD10F09B}.exe
                                                    12⤵
                                                      PID:1800

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{07FC312D-5582-4d1f-8D57-BF8BE79B0F53}.exe

                                Filesize

                                35KB

                                MD5

                                7ff0be6ecccf8c153a6efdf8dd0858e0

                                SHA1

                                48ba7960878ee36569ebce99c8cc217aa2d2c9c7

                                SHA256

                                0b130bc82a765f0351d757b07bf66a07f5dcc9f4abd42d0b7bf25c064c825d66

                                SHA512

                                ce585cbe268e669d13c87377e49cff49bdb4f31575cfb7bf677bbba128e44525a2bfa95c1ed52ea62d220867adf2f671c47cc8e531780aaa499da9388471cf76

                              • C:\Windows\{07FC312D-5582-4d1f-8D57-BF8BE79B0F53}.exe

                                Filesize

                                49KB

                                MD5

                                803c107b7f054c2e7462b4a2a0623f85

                                SHA1

                                3f5aaec98fc2383dadbc17f15a4a1f9db20a37a5

                                SHA256

                                ad95059b8b0c11281e0f60eec2467c0ee2b06ea5769bb150c767e104afb6af49

                                SHA512

                                d0d2385b227c418955cfa9962e250fe85886ababd15dff212c2887667f8a73e81cd374620b9268e4031319725d3acbcc684a2a708989491c55c4572669fd20d6

                              • C:\Windows\{1062C682-5627-4608-8B87-33D88C7960C7}.exe

                                Filesize

                                35KB

                                MD5

                                eb9267aa94ad8608fb2a9d70ba67d2c2

                                SHA1

                                a1b63cc8a063af4074d498402f3833f19ee44d32

                                SHA256

                                effd6ee5cbc76b01ae734c3e9845989bfb5415676a27c34e19a6d84247567fbe

                                SHA512

                                5bcbfa74f28aa0990638d0e87fe9ab1ecc008f4827ed0dedb7ac9d597c2e783dba1ab49bd0bb41ef78f529bdd0c66c7b563eee60b2c2a5554255fccc7b4bf3e9

                              • C:\Windows\{1A804D22-AAC9-497d-8310-EAF645889DB5}.exe

                                Filesize

                                998B

                                MD5

                                0daacac0ff8059af9cfc1a1ada373ed5

                                SHA1

                                e936959f6bddd2ff6ca166b6f58d7170b506b4c3

                                SHA256

                                668b3d9ba09a96b314548f3120b4abfc647b2d896cdfa9ddea2ccb22fa25706c

                                SHA512

                                516a09afd7a811b69b3086cd1cf9c0ba5232ab505b1ee1ae60ed637a137e29f45cc1e1561871e694dc996eb7b293b5d4b77861154934414411ac85bc4533a8dc

                              • C:\Windows\{24B3A845-A050-49ff-8073-72D7BCC59B1F}.exe

                                Filesize

                                1KB

                                MD5

                                e390d5e1c9a5f95b99521de37c76e69b

                                SHA1

                                37cde85109a08b3b0d68aef382e00b09f3768e2d

                                SHA256

                                80ca884b931bb88ac3c9c819bf370704a34239361066e032d31c01fe2e1ee4c6

                                SHA512

                                fad1ef08769adc38455e2b5a614e36854b41144719f164202398888d97d387dac4c98de29088b222fb2756fe416ef6deb4fdf88649aa55ea91de4927542f8e69

                              • C:\Windows\{24B3A845-A050-49ff-8073-72D7BCC59B1F}.exe

                                Filesize

                                2KB

                                MD5

                                9092ef20593835b11602838e732e8844

                                SHA1

                                389e70dbf617239420182f684ad21ca026377c32

                                SHA256

                                2aeb95b9a1032b8f9824db27ffed1538f3ffa459709fca3327b1b504955c1638

                                SHA512

                                c9b52667a2d8ce458be133fa6ef7387cf641a376d80c1f3c31994c616dcce480beb1019db37d29b296e6da726d0c851d2aaa192c1ceca43da82b6356173aeba5

                              • C:\Windows\{275EA193-FABA-44f7-A92A-90114514764B}.exe

                                Filesize

                                31KB

                                MD5

                                b177bb98c96918fd4875b3307d3f3afe

                                SHA1

                                acf9851326a4d8d4d49243a13af9bc77777eacf5

                                SHA256

                                c22fb11ecd74a7ebae09fd46eeb04c6538983e12ff0ebfdd2d249b51190377e4

                                SHA512

                                fdf228ad7c36d6663f4526a38d8289d2302222355001264476f9c70ad9934400d2248599ecab1fd4aa4fdfbe6f62d1b4620336146add8e290e7c8790b12b1c9c

                              • C:\Windows\{275EA193-FABA-44f7-A92A-90114514764B}.exe

                                Filesize

                                81KB

                                MD5

                                648f614f99e3f9b85fa51e3027db08f6

                                SHA1

                                d5939f0151e4898983e3a2a13db5da330e7fd747

                                SHA256

                                f6ccc28e0e448f0ee6cd504aa61f4288b09e5783db84eb1f9d7e7c232ce3ec98

                                SHA512

                                65a600c503ead22f9eb76e5a97afa0b445e848d2d19b274028823564dde32e40bdb8e88da111514b65962df8f4a4695273a57a2b9b7b3c8d8792620908ba7123

                              • C:\Windows\{30F2C737-CADD-4b4e-8B59-95D34513651F}.exe

                                Filesize

                                44KB

                                MD5

                                83305a80d64ef6bf9d18821ec1974101

                                SHA1

                                855ffa63adfb4f955756037b59e4e92265dc401b

                                SHA256

                                2dd2acf96e195ee7b49dd41a6470117502b83c6c47351ef34ce6e2366bf83f5f

                                SHA512

                                eae7f8a913da56cb9d43a5cfe5d569422787b6faa96c1def04428e5b23aa3448f993bc423a09255db294225a7208d3c45055d88e2b9e1815d5307f4c090f68a0

                              • C:\Windows\{30F2C737-CADD-4b4e-8B59-95D34513651F}.exe

                                Filesize

                                57KB

                                MD5

                                6377cee5d8c76f9fdbd15ac810db0f9e

                                SHA1

                                f766d6d3c1a586b007663d52343c96be60d0bdf3

                                SHA256

                                269460f75e34be12efbc73f045183ec5eefff38b3e3cd1489f10887d3c0fb988

                                SHA512

                                d4f2300f14fe2d1171ef35cd82813b1e18c55e147e05db679a9bb0a8f4b7c155f6974078175baa8f4183b6af35828a469eb10b6815095c0fd56294ec1d4071f5

                              • C:\Windows\{346444FA-32E7-48b0-824E-F754A3A52B40}.exe

                                Filesize

                                13KB

                                MD5

                                9646b719f3a220299905c838ccc77a3f

                                SHA1

                                5d01f0c27504b7e8472279e710a14c0b1fdbc2c8

                                SHA256

                                f4342096f998a54f590206360f4ad41e6cab2cedafab524e3ad65e0e4526a9ec

                                SHA512

                                89b49aeb4f781a5ed9770f12ef0ccb4ad40a4e42ef67c3cb43c39928624db195de69c91ead6fa0fa26593c5eabd9f4e88543a3c47b3cc2f37ab27ad41140b273

                              • C:\Windows\{346444FA-32E7-48b0-824E-F754A3A52B40}.exe

                                Filesize

                                26KB

                                MD5

                                906a29516627d1ed0ba1e9b76eb4d2be

                                SHA1

                                9708319675a5109ebac6c21a16d88d971db24c39

                                SHA256

                                4f3276960e09a7c18c62e13498a0935f1702105b43c46cd32a7525892020bc15

                                SHA512

                                2c5fbe99a85d135378dd193a8a09e40a54f66305fc900e211b798e2da8a29ca31585013f764ce673b90b4c6c270199c008749e398fa37842c4ae0e2ac0bfd98b

                              • C:\Windows\{36840597-85F3-40da-95DD-16EA3C7E47BE}.exe

                                Filesize

                                13KB

                                MD5

                                ab1809158120e4d429e92072ebc22bc5

                                SHA1

                                9be6ab09a20a5d7bd5a30dff82a95b43e43bac27

                                SHA256

                                ec43a3b22967ab36052b95c50dc337e946fb3ac95c3eecd8edf5e4b8087f1243

                                SHA512

                                098dd9a31012476938b5fe9348a1ad27b63e9b7f73e612dfd3e577f4b5801cfc514586d9c6c03b282c7bb3b0c643ebe421a821b3fa23dfd123a2520e078b46d9

                              • C:\Windows\{36840597-85F3-40da-95DD-16EA3C7E47BE}.exe

                                Filesize

                                85KB

                                MD5

                                7cfbda7821101def49cbe624b3d2737c

                                SHA1

                                bb0bd65fc642e3ee9417b29953fc47f912d6afc7

                                SHA256

                                a794ea4a76e3e43634203c2f99a55446e19deb46302bf50175a3a64c2b2afcfa

                                SHA512

                                d38da8df39c67d794242fdbe5aa3b6ec87b34dfaf8320441a0b2ab22c22efbfa6fd10c446877ffe6d02725d8c027304e4b17698250d6f25ec49de0ce2db899de

                              • C:\Windows\{5D81ACB1-0E1D-43b3-9280-8020D4BA549C}.exe

                                Filesize

                                81KB

                                MD5

                                2d37473deef08f8dff1919be3787d9ed

                                SHA1

                                d84e2df10ce54ca50801e2cfb21e1a148c1938ae

                                SHA256

                                f0e7425ff709f5e3930f05f89878ff93e512b6b1d2d4f98b9bab165b700763a4

                                SHA512

                                862f59e6a0998f844a8f06f614f3c89455ff384146e46908288abd4741023119a2b09a3c311fc5d3058e0c21b89b0862fca87e54fb09cfaf6b904100253d987b

                              • C:\Windows\{5D81ACB1-0E1D-43b3-9280-8020D4BA549C}.exe

                                Filesize

                                52KB

                                MD5

                                d575245ae8dbb51c1a4eeb8afcf33a0d

                                SHA1

                                61e716047f7dcb2a4576dc1bf6d427bdf51d8f9b

                                SHA256

                                e89cd21eb997ed6a83003f503acfe01ccf762ff70d3e97875c5a55ccb5114f2d

                                SHA512

                                790fb4f2d761797da2f5760bb30311d5c3df093f43796e7cf45e164643e2847aeb687b0989cd3424671024e71c182f4ac2264473b800056b5d3a247c348fac27

                              • C:\Windows\{CFEED0E2-2B43-431c-BEE8-3DBCDD10F09B}.exe

                                Filesize

                                33KB

                                MD5

                                0bf1e60faf74846dc5576acd7e8e9a67

                                SHA1

                                50f9b4261494cb23eaae24e9730fe23372d68454

                                SHA256

                                d70fa9487b561b3d1b4031bd3ec491b617be237b11f82b82a311ec2644e294fd

                                SHA512

                                f2c2cb6029ea21d07d0ca2f66b4870aa13d111ac4dfc54dfb43ea8efed1129fe7c477043332b33051fdace797a9cc7bca8449fdf20df9a167d83de5bae33111e

                              • C:\Windows\{FDB7B724-AFBA-4b1c-8913-6C1E5202831E}.exe

                                Filesize

                                71KB

                                MD5

                                afcf93b6d759f80748a0636bcc1f6698

                                SHA1

                                d2581326ab25451c24d6aeed10b08ccd6ca49dae

                                SHA256

                                aaeca9d7a97fd23d243fbf9b58a0bcbbfbcf78b1c3a4231c0fef9c7f9a91ad98

                                SHA512

                                8b18e09fe42191b848c75ae74e371f58e0810811c959c33f8fd635005587c129a415443598ce6d8a83dfce64d6b32e1519afded977924871dc11f3d15561f434

                              • C:\Windows\{FDB7B724-AFBA-4b1c-8913-6C1E5202831E}.exe

                                Filesize

                                11KB

                                MD5

                                7405c293abc808fa2299e80a9d9b1cb9

                                SHA1

                                12ce95d7544a01ddf1a06c2a9fd14e9a34f6d446

                                SHA256

                                efea6060fee513729ecc6ae99851cb8d4c10462eb695dfc42f5ca5004be9eba3

                                SHA512

                                a6cc70ac7f0431c65c845101d61e6255b2c78670dae1d72742da33fcadeede0ae9f4c4360f2c15ee5dd09205f2c2c1d15f81b751ea170cf4a06dfbdccf2c4810