Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 12:07

General

  • Target

    2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe

  • Size

    192KB

  • MD5

    30634a46d23d0e3566c4d1d8f7f20051

  • SHA1

    4c82333b3930241598c80109c151419867d25ab6

  • SHA256

    0186d0d7b1cc38f73485fa487f3b20803154f2312128725df2494a40a8b37d80

  • SHA512

    55f50cabf246ba3c20cfae101ac1005306ef124dbd51d92008d965457bdfeed0868262d2051c8fa99e8593850bab66eac0bcdba1c71b72575fa7a1eb55e381d7

  • SSDEEP

    1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exe
      C:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe
        C:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe
          C:\Windows\{BDC003BE-A05E-40a6-916D-D715E8F0DEAE}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2484
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{BDC00~1.EXE > nul
            5⤵
              PID:2068
            • C:\Windows\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe
              C:\Windows\{83A5CB57-5154-4767-BB92-17106AA1EF8E}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{83A5C~1.EXE > nul
                6⤵
                  PID:2732
                • C:\Windows\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe
                  C:\Windows\{38E88D67-9538-4d21-AE27-C7D22A64C0B9}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:960
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{38E88~1.EXE > nul
                    7⤵
                      PID:780
                    • C:\Windows\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe
                      C:\Windows\{CDC5E69D-D361-4f1e-9462-429718EBA1E8}.exe
                      7⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1896
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{CDC5E~1.EXE > nul
                        8⤵
                          PID:2792
                        • C:\Windows\{961F8FF2-47EC-459c-90B2-368A44586B62}.exe
                          C:\Windows\{961F8FF2-47EC-459c-90B2-368A44586B62}.exe
                          8⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2548
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{961F8~1.EXE > nul
                            9⤵
                              PID:1604
                            • C:\Windows\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe
                              C:\Windows\{1141F645-60AB-4407-83BD-C1C84D5A02BF}.exe
                              9⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:948
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{1141F~1.EXE > nul
                                10⤵
                                  PID:2144
                                • C:\Windows\{0A554E23-F28B-497f-A094-B1371A108E7C}.exe
                                  C:\Windows\{0A554E23-F28B-497f-A094-B1371A108E7C}.exe
                                  10⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2964
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{0A554~1.EXE > nul
                                    11⤵
                                      PID:488
                                    • C:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe
                                      C:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe
                                      11⤵
                                      • Modifies Installed Components in the registry
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2276
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{175A8~1.EXE > nul
                                        12⤵
                                          PID:580
                                        • C:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe
                                          C:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe
                                          12⤵
                                          • Executes dropped EXE
                                          PID:1664
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0FA28~1.EXE > nul
                          4⤵
                            PID:2728
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{35695~1.EXE > nul
                          3⤵
                            PID:2640
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1076

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{03A0D1A5-537C-4d4b-86F4-6059B7075FBA}.exe

                        Filesize

                        192KB

                        MD5

                        f365e3949a30e1376d754b00ef008c78

                        SHA1

                        ac33065fa3e84888d7d8c97923e6ce1a147e6dfa

                        SHA256

                        26c50d2e84ba908d280d221e13c252a0e6a259e349e6880b9d90c5dc46d0d596

                        SHA512

                        0d9345fc4e63374c7d0ed7fab72d50a8aa39a6930aaadf7614e7246883c88218e95b40ee0ef571ff4cf3eaa9f73617f29fac6ebb066b258d9d50fcf20886846d

                      • C:\Windows\{0FA28F0C-4B6A-49c5-AE0D-D2EAF263CAC0}.exe

                        Filesize

                        192KB

                        MD5

                        7f25b036e91ddf882482be3cfc477812

                        SHA1

                        fd7c2a0c7b94a6e17a226c02c2b62f7b907f9fda

                        SHA256

                        09996628e282b99a19318d12bf783fa821d2df1420868b57350fec9701e35b52

                        SHA512

                        9e314a9233f50d47c44d7498b9297f51203be4491565eb1d9ba5d8f5771333a95693ee197522275a3b293b8cc0a5ee6f30fdc66094740ee3a4dd56b17d66d363

                      • C:\Windows\{175A8A4D-55A2-4362-BB49-0E5C39E610EB}.exe

                        Filesize

                        192KB

                        MD5

                        ffed0bbb61e4dbb3f67edab0f12a19fc

                        SHA1

                        dad62209ed1b15080cff188b1020f1cf6a862b85

                        SHA256

                        6fedeec407fbef9c82493d17b2ae1abeaac75d5c503bd95f42712d108b6c595f

                        SHA512

                        9b4ee9fe85c9e4f52bb6e16eca35b2630799af3801e8a236331338d2b8489017f5b7fdb15a79afaecec6cf794588c0c890c314355ccfe911467a5b493494cd34

                      • C:\Windows\{35695E08-6D48-4103-B68F-7F48E4506414}.exe

                        Filesize

                        192KB

                        MD5

                        cba176642a7fa08a309045ba617d6eb5

                        SHA1

                        9fa8cecf2c4db04f898f6a9bf18bd5825850eee8

                        SHA256

                        727841373dc4d359f973e963a7dc63a71dd80e73c28270b085663938cca8a9ba

                        SHA512

                        fb6ff4d1d2a18508a3c45aac81d8b3027536252bb4a1d67cb4b181c5406becc4bc1ea9fb19015991c6cd79c9bd993c87ba58869f07fbbe40599919a3d2796491