Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
221s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
-
Size
192KB
-
MD5
5d64cea0bb702716f9855520bea944b0
-
SHA1
f67b195390c2962748cd4d7dbe0853ea20ef640d
-
SHA256
186f78be381757c893468cec815620a2b16bfcc1840ee853e7ed6256a66769b8
-
SHA512
ae7328c9534a6b2adb76a176ab6b2ee912a7c0960271f383bf85da2915341bb3294f55c7488995d7fe46880386fb3ec3719832629dde4d5b11ca18012f49b633
-
SSDEEP
1536:1EGh0otl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0otl1OPOe2MUVg3Ve+rXfMUa
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}\stubpath = "C:\\Windows\\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe" 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A589029-3314-4d7c-AE83-2C22222997F3} {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3} {9A589029-3314-4d7c-AE83-2C22222997F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}\stubpath = "C:\\Windows\\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe" {9A589029-3314-4d7c-AE83-2C22222997F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E0A6040-4BF1-4bd0-972A-A54CF06CD9C6}\stubpath = "C:\\Windows\\{0E0A6040-4BF1-4bd0-972A-A54CF06CD9C6}.exe" {0C408F5A-59F8-407c-A218-F11B40226568}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843} 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27AC1A02-5917-4a7f-9576-9546BD5FF36C} {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0} {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}\stubpath = "C:\\Windows\\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe" {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A589029-3314-4d7c-AE83-2C22222997F3}\stubpath = "C:\\Windows\\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe" {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}\stubpath = "C:\\Windows\\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe" {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C408F5A-59F8-407c-A218-F11B40226568} {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C408F5A-59F8-407c-A218-F11B40226568}\stubpath = "C:\\Windows\\{0C408F5A-59F8-407c-A218-F11B40226568}.exe" {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0E0A6040-4BF1-4bd0-972A-A54CF06CD9C6} {0C408F5A-59F8-407c-A218-F11B40226568}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}\stubpath = "C:\\Windows\\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe" {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D} {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe -
Executes dropped EXE 7 IoCs
pid Process 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 788 {0C408F5A-59F8-407c-A218-F11B40226568}.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe File created C:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe File created C:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe File created C:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exe {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe File created C:\Windows\{0E0A6040-4BF1-4bd0-972A-A54CF06CD9C6}.exe {0C408F5A-59F8-407c-A218-F11B40226568}.exe File created C:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe File created C:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe File created C:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe {9A589029-3314-4d7c-AE83-2C22222997F3}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe Token: SeIncBasePriorityPrivilege 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe Token: SeIncBasePriorityPrivilege 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe Token: SeIncBasePriorityPrivilege 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe Token: SeIncBasePriorityPrivilege 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe Token: SeIncBasePriorityPrivilege 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe Token: SeIncBasePriorityPrivilege 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2988 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 91 PID 2564 wrote to memory of 2988 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 91 PID 2564 wrote to memory of 2988 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 91 PID 2564 wrote to memory of 1360 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 92 PID 2564 wrote to memory of 1360 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 92 PID 2564 wrote to memory of 1360 2564 2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe 92 PID 2988 wrote to memory of 2544 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 94 PID 2988 wrote to memory of 2544 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 94 PID 2988 wrote to memory of 2544 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 94 PID 2988 wrote to memory of 1048 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 95 PID 2988 wrote to memory of 1048 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 95 PID 2988 wrote to memory of 1048 2988 {344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe 95 PID 2544 wrote to memory of 2100 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 96 PID 2544 wrote to memory of 2100 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 96 PID 2544 wrote to memory of 2100 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 96 PID 2544 wrote to memory of 564 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 97 PID 2544 wrote to memory of 564 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 97 PID 2544 wrote to memory of 564 2544 {9A589029-3314-4d7c-AE83-2C22222997F3}.exe 97 PID 2100 wrote to memory of 4516 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 99 PID 2100 wrote to memory of 4516 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 99 PID 2100 wrote to memory of 4516 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 99 PID 2100 wrote to memory of 4380 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 100 PID 2100 wrote to memory of 4380 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 100 PID 2100 wrote to memory of 4380 2100 {F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe 100 PID 4516 wrote to memory of 2936 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 105 PID 4516 wrote to memory of 2936 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 105 PID 4516 wrote to memory of 2936 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 105 PID 4516 wrote to memory of 4364 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 106 PID 4516 wrote to memory of 4364 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 106 PID 4516 wrote to memory of 4364 4516 {27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe 106 PID 2936 wrote to memory of 2028 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 112 PID 2936 wrote to memory of 2028 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 112 PID 2936 wrote to memory of 2028 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 112 PID 2936 wrote to memory of 3924 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 113 PID 2936 wrote to memory of 3924 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 113 PID 2936 wrote to memory of 3924 2936 {1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe 113 PID 2028 wrote to memory of 788 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 116 PID 2028 wrote to memory of 788 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 116 PID 2028 wrote to memory of 788 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 116 PID 2028 wrote to memory of 212 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 117 PID 2028 wrote to memory of 212 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 117 PID 2028 wrote to memory of 212 2028 {8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exeC:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exeC:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exeC:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exeC:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exeC:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exeC:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exeC:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
PID:788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8D1A4~1.EXE > nul8⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1C4BA~1.EXE > nul7⤵PID:3924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{27AC1~1.EXE > nul6⤵PID:4364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F08BB~1.EXE > nul5⤵PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9A589~1.EXE > nul4⤵PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{344DB~1.EXE > nul3⤵PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD546543441c61b39b210b66098bcf3e8b6
SHA1e4a10b04a8648f5c5c90760386800cfabbd10be6
SHA2562bdb27d973a360899d88ded2881c63231d95bd516900893f25e229649d81bfb9
SHA512c93a76459ccdc66db99bfe51ab3a677a858a6e7b611092b849b68b2aca8dc0b8db7e622701a7125518ded356ff4dd428e765aa89f0c8ea3df67c6098ceb07b55
-
Filesize
192KB
MD5d18c91b48e5941a95e57552257d1ff0c
SHA16cc6d90a2d53df132be2a936ebdf4dba63e49964
SHA2564a7242fe51dca2ddb4e24a323d74a87828e1d4e96b695e63d967c2b428559108
SHA5121e7d11b99b4c69904feb520988d1790ea788024fd061c83e6d1cf6a81faee7764a48a033a4c1426cc8d89413ef01e2c0178e99fc652ac2f8755a1eb470b02320
-
Filesize
192KB
MD5d844f06e17db01c9a32786bbd4387fd4
SHA194f876ba92d41d50e914468998655b002800b0fb
SHA256dc9d38dee30071b14b3e79539d3d5893d6e0002a9be9a31af636aed89b61d23a
SHA5126adc35b85b8d977683d61fa06d0bfadb87f26b4969a802c066431afd52b524436ea7cfb46944dbe8712d0fcc7a49f80891235d5a5891cc829c784dcf528447a8
-
Filesize
192KB
MD5f4aff3ca50b18e3a179eae1836d04442
SHA12a1e0e68d6431bf33cda4770e68153a3072edf5d
SHA2561b4ad39e4a1c70b0399e577860d872f55c09f1c3641b0fb07787f25d4090849b
SHA512985f1f7ef8c25062c7a963a8a75c6ed755adb1b9e5ac85fe35086c692eb1c71ec43735f00f9886f55b178987516a3edf89a0998a6aaa6d89db98a7ac137fd4bb
-
Filesize
192KB
MD54d7dc8f2b2d049a904b15a16bb609e3e
SHA1e54eced9307a2b1127c1a71559cc80ccceb6181e
SHA256067ab46600bbfcdc76996e8d88f90ae286e141cb180e2e5c2c259c38951909a8
SHA512e629da7bb916229e4374136f2529fe849241d600638c9a3d626a9a35dee9e7bde23a3296c2baed4c045f0786950f93983eaab944e72256151c93d78f8d5c5e84
-
Filesize
192KB
MD5786733f10509f89f0411341cbdc675a3
SHA1c98aac1481ea6f7bf8f5822e9128a195c88c6697
SHA2565f98fd0d3f39ca89d4c61735c40048f9a94aa70da71be12c19f4cd8d89d5d0a9
SHA512f5721dca84794782c447dfee75e0f81a002dd4acd6b60e75577251498a9b5b1cafcb2f800cd1f30f47e28b60606d64703326c6925f3b477b8c6780f8dabb0a25
-
Filesize
192KB
MD5625cca95cce0aae95e732f196e438bcc
SHA129a123fd982c023c318821b2cdf53b55e7885b05
SHA256b6e067e132bfb54496fa7982787345cbbb99f709f03606cef3545e55af0b0f53
SHA51265702d3d497fbd3c0c4c00448bea90d1916e7bcf62df37ec237c1fe92289d6eb266cef41ec361c73426990af8d26e2441ac69cd2ec6796874a06c23867e20772