Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
214s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
-
Size
192KB
-
MD5
30634a46d23d0e3566c4d1d8f7f20051
-
SHA1
4c82333b3930241598c80109c151419867d25ab6
-
SHA256
0186d0d7b1cc38f73485fa487f3b20803154f2312128725df2494a40a8b37d80
-
SHA512
55f50cabf246ba3c20cfae101ac1005306ef124dbd51d92008d965457bdfeed0868262d2051c8fa99e8593850bab66eac0bcdba1c71b72575fa7a1eb55e381d7
-
SSDEEP
1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AAD7A3BD-3963-402e-90EF-2976828F9CBB} 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6} {689F5836-566E-413b-988D-05A080B5DC2F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1356FCAC-3F82-4e20-8904-E7C6A999C81E} {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC86CCB8-BDBF-4827-A133-262ECA5195D2} {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455} {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37973F11-3DA3-487e-B4F1-C84861E741CF} {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{689F5836-566E-413b-988D-05A080B5DC2F} {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A1BF184-FE9B-4876-BC68-483A5F2A13C1}\stubpath = "C:\\Windows\\{9A1BF184-FE9B-4876-BC68-483A5F2A13C1}.exe" {D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}\stubpath = "C:\\Windows\\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe" {689F5836-566E-413b-988D-05A080B5DC2F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}\stubpath = "C:\\Windows\\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe" {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}\stubpath = "C:\\Windows\\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe" 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37973F11-3DA3-487e-B4F1-C84861E741CF}\stubpath = "C:\\Windows\\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe" {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{689F5836-566E-413b-988D-05A080B5DC2F}\stubpath = "C:\\Windows\\{689F5836-566E-413b-988D-05A080B5DC2F}.exe" {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}\stubpath = "C:\\Windows\\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe" {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}\stubpath = "C:\\Windows\\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe" {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A1BF184-FE9B-4876-BC68-483A5F2A13C1} {D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe -
Executes dropped EXE 7 IoCs
pid Process 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 844 {D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe File created C:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe File created C:\Windows\{9A1BF184-FE9B-4876-BC68-483A5F2A13C1}.exe {D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe File created C:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe File created C:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe File created C:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exe {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe File created C:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe {689F5836-566E-413b-988D-05A080B5DC2F}.exe File created C:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe Token: SeIncBasePriorityPrivilege 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe Token: SeIncBasePriorityPrivilege 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe Token: SeIncBasePriorityPrivilege 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe Token: SeIncBasePriorityPrivilege 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe Token: SeIncBasePriorityPrivilege 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe Token: SeIncBasePriorityPrivilege 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2004 wrote to memory of 5084 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 93 PID 2004 wrote to memory of 5084 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 93 PID 2004 wrote to memory of 5084 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 93 PID 2004 wrote to memory of 3884 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 94 PID 2004 wrote to memory of 3884 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 94 PID 2004 wrote to memory of 3884 2004 2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe 94 PID 5084 wrote to memory of 1684 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 96 PID 5084 wrote to memory of 1684 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 96 PID 5084 wrote to memory of 1684 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 96 PID 5084 wrote to memory of 1716 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 97 PID 5084 wrote to memory of 1716 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 97 PID 5084 wrote to memory of 1716 5084 {AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe 97 PID 1684 wrote to memory of 3636 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 98 PID 1684 wrote to memory of 3636 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 98 PID 1684 wrote to memory of 3636 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 98 PID 1684 wrote to memory of 1604 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 99 PID 1684 wrote to memory of 1604 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 99 PID 1684 wrote to memory of 1604 1684 {37973F11-3DA3-487e-B4F1-C84861E741CF}.exe 99 PID 3636 wrote to memory of 4632 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 100 PID 3636 wrote to memory of 4632 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 100 PID 3636 wrote to memory of 4632 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 100 PID 3636 wrote to memory of 1876 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 101 PID 3636 wrote to memory of 1876 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 101 PID 3636 wrote to memory of 1876 3636 {689F5836-566E-413b-988D-05A080B5DC2F}.exe 101 PID 4632 wrote to memory of 3040 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 104 PID 4632 wrote to memory of 3040 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 104 PID 4632 wrote to memory of 3040 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 104 PID 4632 wrote to memory of 2792 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 105 PID 4632 wrote to memory of 2792 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 105 PID 4632 wrote to memory of 2792 4632 {7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe 105 PID 3040 wrote to memory of 740 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 109 PID 3040 wrote to memory of 740 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 109 PID 3040 wrote to memory of 740 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 109 PID 3040 wrote to memory of 2428 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 110 PID 3040 wrote to memory of 2428 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 110 PID 3040 wrote to memory of 2428 3040 {1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe 110 PID 740 wrote to memory of 844 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 113 PID 740 wrote to memory of 844 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 113 PID 740 wrote to memory of 844 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 113 PID 740 wrote to memory of 2592 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 112 PID 740 wrote to memory of 2592 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 112 PID 740 wrote to memory of 2592 740 {EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exeC:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exeC:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exeC:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exeC:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exeC:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exeC:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC86C~1.EXE > nul8⤵PID:2592
-
-
C:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exeC:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1356F~1.EXE > nul7⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D0D2~1.EXE > nul6⤵PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{689F5~1.EXE > nul5⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{37973~1.EXE > nul4⤵PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{AAD7A~1.EXE > nul3⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5d9ebef30e4659ef1226d4b4890cfff95
SHA199592ee432a1afa291e1edbe5e81c40567c69fae
SHA256f732d3a4b0346e48cb6f5040094069b9c292453aede42ebfbba4be5be59f5b27
SHA512a3e318e52dd90eb6253bc19c50131507e2fce4dd3190fad806c5da24585dccb701eda6943303e0fbd553283910c9ed35276522f7178ab7adcf7e4debb309dbc4
-
Filesize
192KB
MD566ed66c036d18d0de06e3b6bb13d84a9
SHA1702a94792c03015a66358eb5a4ad90dffc2420f5
SHA256ab7f8de8cf2f30c560de0ad0e0c2a1f4c38da4aeb49c416b228e70c546576eae
SHA5121867b4d319c901db5bbdcd0fe51bf330a7481d41fbd75f1d982f7010305ef240f5e868efbca7d4909309a2b51b70f7f7b608063d7c69da6fecea2714cd630268
-
Filesize
192KB
MD593c23329bb1fdb9a0994634e3db38857
SHA14b122bb4a4fd274f34730f11a729ab2c7d48e3ba
SHA2561ea55b8020e5fe1978f6a0c1aae7a46ea803c09782597fa82fa75c3c934e78c5
SHA5124d61716e8a1d0b6d42cdb0cfff64af1ee0d4f325e25f42049538129923b7307ee6c572bea5ee4946d7f44eb3d16b8a1871a3b4729161afb7094a8b97163efa36
-
Filesize
192KB
MD559fb60a24f26f0f802fe3b05ce19c2e8
SHA1e45c953742386f6884bcc86023621c16749a2966
SHA2563ec0228b4ad11f01d349c42fa8fbab28916eeccb7156e2256ea7e5270a7865ef
SHA51245ddb68b669ffed3c0158c4c291b656865d11bcfcd5cde79f882699071666ec59064834f96f5780e0f92a08b37f0c0b9318be3175f682a532034792186e4c76f
-
Filesize
192KB
MD5e333367fd8cd613da91afd882edc0769
SHA1e7374afaaaa7b689e3f640842616bb9762d970ee
SHA2568ba4874e34abd19ece59429f04db49734a29b68c8c5e694eeb7fd691a7402d33
SHA51256c0ab0506a5ea29234dc070e2116d231df6290473978a73a186faa25fef476e4da9c82778e82caeeba2dff225bdec9c040268f8375647fcd522c06cb9cbfafa
-
Filesize
192KB
MD53401859c55ca07ce93b4778b4dc8669c
SHA17946192a9f3cb11b71116382ab88f25fe1458830
SHA25644237af423fa6ed3b783e7642f3baf80ab4830585f33c6c579f7afcc8edb9b66
SHA5125c13a071b1f0468b93b4c4d678e4e40ba58c7bcbed740095779bdcf572e4f16baae61e5dac5a725fc0738e673b229bd3c4e1df05552ebbacee9a1a7754e597cf
-
Filesize
192KB
MD55b8b26b92eb73dbc79ea595de1ef812d
SHA193dd54e30e4b459716674c4564d65775dd37744e
SHA2560cf5e75bfe2a8e781b72f0dcfc342ca1f92f2a101115636ba4a181b5723ec8ab
SHA512cdaf47d10597c2ff61b8b981265fb4082afa133be36d2dd394384eed3fb9096afa44ab7e3ffc594cb653e75a76ef4734c62b61914dc48c3058cc5d074895adcd