Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:15

General

  • Target

    2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe

  • Size

    344KB

  • MD5

    b0fda38a27f54302777e961897fddf66

  • SHA1

    cecf15fbbd8c38ac8e0933af874ca867f3f9446e

  • SHA256

    2ad843e71b1266755649879ef93b882292dd4e3ce8509ce01daaa8e7790b01ed

  • SHA512

    1fd8a528f224ed0a59f4647bad78561e7773fa1c146e08781a4766661f03c9dd4bd95a8c8d10f6b97ed169cf377e52f681cb9f731e2d1f7d3363d15f59dd1e7d

  • SSDEEP

    3072:mEGh0otlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG3lqOe2MUVg3v2IneKcAEcA

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:3644
      • C:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe
        C:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{DB6C3~1.EXE > nul
          3⤵
            PID:4808
          • C:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe
            C:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe
            3⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:540
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{6C5DE~1.EXE > nul
              4⤵
                PID:3104
              • C:\Windows\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe
                C:\Windows\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5028
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{BA3CB~1.EXE > nul
                  5⤵
                    PID:828
                  • C:\Windows\{59D30B33-D5EA-45df-87A9-700460151D40}.exe
                    C:\Windows\{59D30B33-D5EA-45df-87A9-700460151D40}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4332
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{59D30~1.EXE > nul
                      6⤵
                        PID:2424
                      • C:\Windows\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe
                        C:\Windows\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe
                        6⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1580
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3C987~1.EXE > nul
                          7⤵
                            PID:1364
                          • C:\Windows\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe
                            C:\Windows\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe
                            7⤵
                            • Executes dropped EXE
                            PID:4004
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{1508C~1.EXE > nul
                              8⤵
                                PID:4396
                              • C:\Windows\{76F92CB9-8DFA-407e-BC81-2B3EAF52DBEA}.exe
                                C:\Windows\{76F92CB9-8DFA-407e-BC81-2B3EAF52DBEA}.exe
                                8⤵
                                  PID:1312
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{76F92~1.EXE > nul
                                    9⤵
                                      PID:1316
                                    • C:\Windows\{84525BED-4F54-493a-A032-2226F57F89ED}.exe
                                      C:\Windows\{84525BED-4F54-493a-A032-2226F57F89ED}.exe
                                      9⤵
                                        PID:2460
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{84525~1.EXE > nul
                                          10⤵
                                            PID:4576
                                          • C:\Windows\{D69A0C1C-031B-4b86-AC71-831045F99A7F}.exe
                                            C:\Windows\{D69A0C1C-031B-4b86-AC71-831045F99A7F}.exe
                                            10⤵
                                              PID:1348
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{D69A0~1.EXE > nul
                                                11⤵
                                                  PID:3664
                                                • C:\Windows\{7DDB3750-485B-4abf-86E1-971FF1B12E2A}.exe
                                                  C:\Windows\{7DDB3750-485B-4abf-86E1-971FF1B12E2A}.exe
                                                  11⤵
                                                    PID:992
                                                    • C:\Windows\{EC11004E-C57D-4bd0-9B56-8D5C2AB8A31B}.exe
                                                      C:\Windows\{EC11004E-C57D-4bd0-9B56-8D5C2AB8A31B}.exe
                                                      12⤵
                                                        PID:1388
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{7DDB3~1.EXE > nul
                                                        12⤵
                                                          PID:3804

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe

                                    Filesize

                                    344KB

                                    MD5

                                    568acf0bae57ce5a4d49b0161ebfeed4

                                    SHA1

                                    75f3242d25b03c6541f936a8414a23391df554a2

                                    SHA256

                                    7a95138ee44643b33a3dad8f21f9f9e214ec44318665ad682e3b08819d512931

                                    SHA512

                                    a46016114537444de937189a15faa18e6bdfc1c2be3e9b590dfb99cacd8494c92e6a5dff3ccb31389066ae96be0e478681ad41cd775c6954b002eb14adbfcce6

                                  • C:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe

                                    Filesize

                                    344KB

                                    MD5

                                    9551fbd4722d2c033e787bdd37f46544

                                    SHA1

                                    583c8cb65d420d098697a4d3ff1376838c3589b3

                                    SHA256

                                    a7cdb7794eecfaac86682cafe0b11d5842099ff19a334bbfa30550142e592cdc

                                    SHA512

                                    70539aa7ae87276f5f5266933c1258e91ecf693c37130c3f87d5f70a86d487d73af87ad8e3537fc0da00d870b380b2c3b7e78df5de5f8ac4358dba3e032c0b01