Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    221s
  • max time network
    237s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:10

General

  • Target

    2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe

  • Size

    192KB

  • MD5

    5d64cea0bb702716f9855520bea944b0

  • SHA1

    f67b195390c2962748cd4d7dbe0853ea20ef640d

  • SHA256

    186f78be381757c893468cec815620a2b16bfcc1840ee853e7ed6256a66769b8

  • SHA512

    ae7328c9534a6b2adb76a176ab6b2ee912a7c0960271f383bf85da2915341bb3294f55c7488995d7fe46880386fb3ec3719832629dde4d5b11ca18012f49b633

  • SSDEEP

    1536:1EGh0otl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0otl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 16 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_5d64cea0bb702716f9855520bea944b0_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe
      C:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe
        C:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe
          C:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe
            C:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe
              C:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2936
              • C:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe
                C:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2028
                • C:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exe
                  C:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  PID:788
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{8D1A4~1.EXE > nul
                  8⤵
                    PID:212
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{1C4BA~1.EXE > nul
                  7⤵
                    PID:3924
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{27AC1~1.EXE > nul
                  6⤵
                    PID:4364
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{F08BB~1.EXE > nul
                  5⤵
                    PID:4380
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{9A589~1.EXE > nul
                  4⤵
                    PID:564
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{344DB~1.EXE > nul
                  3⤵
                    PID:1048
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                  2⤵
                    PID:1360

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\{0C408F5A-59F8-407c-A218-F11B40226568}.exe

                  Filesize

                  192KB

                  MD5

                  46543441c61b39b210b66098bcf3e8b6

                  SHA1

                  e4a10b04a8648f5c5c90760386800cfabbd10be6

                  SHA256

                  2bdb27d973a360899d88ded2881c63231d95bd516900893f25e229649d81bfb9

                  SHA512

                  c93a76459ccdc66db99bfe51ab3a677a858a6e7b611092b849b68b2aca8dc0b8db7e622701a7125518ded356ff4dd428e765aa89f0c8ea3df67c6098ceb07b55

                • C:\Windows\{1C4BAFD2-D6BF-4153-80FA-51DEB6E29CF0}.exe

                  Filesize

                  192KB

                  MD5

                  d18c91b48e5941a95e57552257d1ff0c

                  SHA1

                  6cc6d90a2d53df132be2a936ebdf4dba63e49964

                  SHA256

                  4a7242fe51dca2ddb4e24a323d74a87828e1d4e96b695e63d967c2b428559108

                  SHA512

                  1e7d11b99b4c69904feb520988d1790ea788024fd061c83e6d1cf6a81faee7764a48a033a4c1426cc8d89413ef01e2c0178e99fc652ac2f8755a1eb470b02320

                • C:\Windows\{27AC1A02-5917-4a7f-9576-9546BD5FF36C}.exe

                  Filesize

                  192KB

                  MD5

                  d844f06e17db01c9a32786bbd4387fd4

                  SHA1

                  94f876ba92d41d50e914468998655b002800b0fb

                  SHA256

                  dc9d38dee30071b14b3e79539d3d5893d6e0002a9be9a31af636aed89b61d23a

                  SHA512

                  6adc35b85b8d977683d61fa06d0bfadb87f26b4969a802c066431afd52b524436ea7cfb46944dbe8712d0fcc7a49f80891235d5a5891cc829c784dcf528447a8

                • C:\Windows\{344DBAD4-A1FF-48b3-87C3-3CAE2406B843}.exe

                  Filesize

                  192KB

                  MD5

                  f4aff3ca50b18e3a179eae1836d04442

                  SHA1

                  2a1e0e68d6431bf33cda4770e68153a3072edf5d

                  SHA256

                  1b4ad39e4a1c70b0399e577860d872f55c09f1c3641b0fb07787f25d4090849b

                  SHA512

                  985f1f7ef8c25062c7a963a8a75c6ed755adb1b9e5ac85fe35086c692eb1c71ec43735f00f9886f55b178987516a3edf89a0998a6aaa6d89db98a7ac137fd4bb

                • C:\Windows\{8D1A4DE5-9F6A-485e-A736-CEBBEFF6959D}.exe

                  Filesize

                  192KB

                  MD5

                  4d7dc8f2b2d049a904b15a16bb609e3e

                  SHA1

                  e54eced9307a2b1127c1a71559cc80ccceb6181e

                  SHA256

                  067ab46600bbfcdc76996e8d88f90ae286e141cb180e2e5c2c259c38951909a8

                  SHA512

                  e629da7bb916229e4374136f2529fe849241d600638c9a3d626a9a35dee9e7bde23a3296c2baed4c045f0786950f93983eaab944e72256151c93d78f8d5c5e84

                • C:\Windows\{9A589029-3314-4d7c-AE83-2C22222997F3}.exe

                  Filesize

                  192KB

                  MD5

                  786733f10509f89f0411341cbdc675a3

                  SHA1

                  c98aac1481ea6f7bf8f5822e9128a195c88c6697

                  SHA256

                  5f98fd0d3f39ca89d4c61735c40048f9a94aa70da71be12c19f4cd8d89d5d0a9

                  SHA512

                  f5721dca84794782c447dfee75e0f81a002dd4acd6b60e75577251498a9b5b1cafcb2f800cd1f30f47e28b60606d64703326c6925f3b477b8c6780f8dabb0a25

                • C:\Windows\{F08BB5BB-C4B6-4622-B281-420C7EAD1CA3}.exe

                  Filesize

                  192KB

                  MD5

                  625cca95cce0aae95e732f196e438bcc

                  SHA1

                  29a123fd982c023c318821b2cdf53b55e7885b05

                  SHA256

                  b6e067e132bfb54496fa7982787345cbbb99f709f03606cef3545e55af0b0f53

                  SHA512

                  65702d3d497fbd3c0c4c00448bea90d1916e7bcf62df37ec237c1fe92289d6eb266cef41ec361c73426990af8d26e2441ac69cd2ec6796874a06c23867e20772