Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    214s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:07

General

  • Target

    2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe

  • Size

    192KB

  • MD5

    30634a46d23d0e3566c4d1d8f7f20051

  • SHA1

    4c82333b3930241598c80109c151419867d25ab6

  • SHA256

    0186d0d7b1cc38f73485fa487f3b20803154f2312128725df2494a40a8b37d80

  • SHA512

    55f50cabf246ba3c20cfae101ac1005306ef124dbd51d92008d965457bdfeed0868262d2051c8fa99e8593850bab66eac0bcdba1c71b72575fa7a1eb55e381d7

  • SSDEEP

    1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oNl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 16 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_30634a46d23d0e3566c4d1d8f7f20051_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe
      C:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe
        C:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exe
          C:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3636
          • C:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe
            C:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4632
            • C:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe
              C:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3040
              • C:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe
                C:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:740
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{EC86C~1.EXE > nul
                  8⤵
                    PID:2592
                  • C:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe
                    C:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    PID:844
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{1356F~1.EXE > nul
                  7⤵
                    PID:2428
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{7D0D2~1.EXE > nul
                  6⤵
                    PID:2792
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{689F5~1.EXE > nul
                  5⤵
                    PID:1876
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{37973~1.EXE > nul
                  4⤵
                    PID:1604
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{AAD7A~1.EXE > nul
                  3⤵
                    PID:1716
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                  2⤵
                    PID:3884

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\{1356FCAC-3F82-4e20-8904-E7C6A999C81E}.exe

                  Filesize

                  192KB

                  MD5

                  d9ebef30e4659ef1226d4b4890cfff95

                  SHA1

                  99592ee432a1afa291e1edbe5e81c40567c69fae

                  SHA256

                  f732d3a4b0346e48cb6f5040094069b9c292453aede42ebfbba4be5be59f5b27

                  SHA512

                  a3e318e52dd90eb6253bc19c50131507e2fce4dd3190fad806c5da24585dccb701eda6943303e0fbd553283910c9ed35276522f7178ab7adcf7e4debb309dbc4

                • C:\Windows\{37973F11-3DA3-487e-B4F1-C84861E741CF}.exe

                  Filesize

                  192KB

                  MD5

                  66ed66c036d18d0de06e3b6bb13d84a9

                  SHA1

                  702a94792c03015a66358eb5a4ad90dffc2420f5

                  SHA256

                  ab7f8de8cf2f30c560de0ad0e0c2a1f4c38da4aeb49c416b228e70c546576eae

                  SHA512

                  1867b4d319c901db5bbdcd0fe51bf330a7481d41fbd75f1d982f7010305ef240f5e868efbca7d4909309a2b51b70f7f7b608063d7c69da6fecea2714cd630268

                • C:\Windows\{689F5836-566E-413b-988D-05A080B5DC2F}.exe

                  Filesize

                  192KB

                  MD5

                  93c23329bb1fdb9a0994634e3db38857

                  SHA1

                  4b122bb4a4fd274f34730f11a729ab2c7d48e3ba

                  SHA256

                  1ea55b8020e5fe1978f6a0c1aae7a46ea803c09782597fa82fa75c3c934e78c5

                  SHA512

                  4d61716e8a1d0b6d42cdb0cfff64af1ee0d4f325e25f42049538129923b7307ee6c572bea5ee4946d7f44eb3d16b8a1871a3b4729161afb7094a8b97163efa36

                • C:\Windows\{7D0D2726-F3C0-4615-A505-1F2D889FD9C6}.exe

                  Filesize

                  192KB

                  MD5

                  59fb60a24f26f0f802fe3b05ce19c2e8

                  SHA1

                  e45c953742386f6884bcc86023621c16749a2966

                  SHA256

                  3ec0228b4ad11f01d349c42fa8fbab28916eeccb7156e2256ea7e5270a7865ef

                  SHA512

                  45ddb68b669ffed3c0158c4c291b656865d11bcfcd5cde79f882699071666ec59064834f96f5780e0f92a08b37f0c0b9318be3175f682a532034792186e4c76f

                • C:\Windows\{AAD7A3BD-3963-402e-90EF-2976828F9CBB}.exe

                  Filesize

                  192KB

                  MD5

                  e333367fd8cd613da91afd882edc0769

                  SHA1

                  e7374afaaaa7b689e3f640842616bb9762d970ee

                  SHA256

                  8ba4874e34abd19ece59429f04db49734a29b68c8c5e694eeb7fd691a7402d33

                  SHA512

                  56c0ab0506a5ea29234dc070e2116d231df6290473978a73a186faa25fef476e4da9c82778e82caeeba2dff225bdec9c040268f8375647fcd522c06cb9cbfafa

                • C:\Windows\{D3CE8B85-E545-42d5-AC7A-B5C75DFE2455}.exe

                  Filesize

                  192KB

                  MD5

                  3401859c55ca07ce93b4778b4dc8669c

                  SHA1

                  7946192a9f3cb11b71116382ab88f25fe1458830

                  SHA256

                  44237af423fa6ed3b783e7642f3baf80ab4830585f33c6c579f7afcc8edb9b66

                  SHA512

                  5c13a071b1f0468b93b4c4d678e4e40ba58c7bcbed740095779bdcf572e4f16baae61e5dac5a725fc0738e673b229bd3c4e1df05552ebbacee9a1a7754e597cf

                • C:\Windows\{EC86CCB8-BDBF-4827-A133-262ECA5195D2}.exe

                  Filesize

                  192KB

                  MD5

                  5b8b26b92eb73dbc79ea595de1ef812d

                  SHA1

                  93dd54e30e4b459716674c4564d65775dd37744e

                  SHA256

                  0cf5e75bfe2a8e781b72f0dcfc342ca1f92f2a101115636ba4a181b5723ec8ab

                  SHA512

                  cdaf47d10597c2ff61b8b981265fb4082afa133be36d2dd394384eed3fb9096afa44ab7e3ffc594cb653e75a76ef4734c62b61914dc48c3058cc5d074895adcd