Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe
-
Size
344KB
-
MD5
b0fda38a27f54302777e961897fddf66
-
SHA1
cecf15fbbd8c38ac8e0933af874ca867f3f9446e
-
SHA256
2ad843e71b1266755649879ef93b882292dd4e3ce8509ce01daaa8e7790b01ed
-
SHA512
1fd8a528f224ed0a59f4647bad78561e7773fa1c146e08781a4766661f03c9dd4bd95a8c8d10f6b97ed169cf377e52f681cb9f731e2d1f7d3363d15f59dd1e7d
-
SSDEEP
3072:mEGh0otlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG3lqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93} {59D30B33-D5EA-45df-87A9-700460151D40}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}\stubpath = "C:\\Windows\\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe" {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}\stubpath = "C:\\Windows\\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe" 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C5DEC48-AA95-4557-BE57-09E436A145FA} {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6C5DEC48-AA95-4557-BE57-09E436A145FA}\stubpath = "C:\\Windows\\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe" {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2} {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59D30B33-D5EA-45df-87A9-700460151D40}\stubpath = "C:\\Windows\\{59D30B33-D5EA-45df-87A9-700460151D40}.exe" {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626} 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}\stubpath = "C:\\Windows\\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe" {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59D30B33-D5EA-45df-87A9-700460151D40} {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}\stubpath = "C:\\Windows\\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe" {59D30B33-D5EA-45df-87A9-700460151D40}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1508C49D-D873-4beb-B5AF-DF18494A3A5B} {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe -
Executes dropped EXE 6 IoCs
pid Process 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 4004 {1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe File created C:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe File created C:\Windows\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe File created C:\Windows\{59D30B33-D5EA-45df-87A9-700460151D40}.exe {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe File created C:\Windows\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe {59D30B33-D5EA-45df-87A9-700460151D40}.exe File created C:\Windows\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe Token: SeIncBasePriorityPrivilege 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe Token: SeIncBasePriorityPrivilege 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe Token: SeIncBasePriorityPrivilege 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe Token: SeIncBasePriorityPrivilege 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe Token: SeIncBasePriorityPrivilege 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3560 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 100 PID 3984 wrote to memory of 3560 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 100 PID 3984 wrote to memory of 3560 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 100 PID 3984 wrote to memory of 3644 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 99 PID 3984 wrote to memory of 3644 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 99 PID 3984 wrote to memory of 3644 3984 2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe 99 PID 3560 wrote to memory of 540 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 102 PID 3560 wrote to memory of 540 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 102 PID 3560 wrote to memory of 540 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 102 PID 3560 wrote to memory of 4808 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 101 PID 3560 wrote to memory of 4808 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 101 PID 3560 wrote to memory of 4808 3560 {DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe 101 PID 540 wrote to memory of 5028 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 105 PID 540 wrote to memory of 5028 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 105 PID 540 wrote to memory of 5028 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 105 PID 540 wrote to memory of 3104 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 104 PID 540 wrote to memory of 3104 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 104 PID 540 wrote to memory of 3104 540 {6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe 104 PID 5028 wrote to memory of 4332 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 109 PID 5028 wrote to memory of 4332 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 109 PID 5028 wrote to memory of 4332 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 109 PID 5028 wrote to memory of 828 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 108 PID 5028 wrote to memory of 828 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 108 PID 5028 wrote to memory of 828 5028 {BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe 108 PID 4332 wrote to memory of 1580 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 111 PID 4332 wrote to memory of 1580 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 111 PID 4332 wrote to memory of 1580 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 111 PID 4332 wrote to memory of 2424 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 110 PID 4332 wrote to memory of 2424 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 110 PID 4332 wrote to memory of 2424 4332 {59D30B33-D5EA-45df-87A9-700460151D40}.exe 110 PID 1580 wrote to memory of 4004 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 115 PID 1580 wrote to memory of 4004 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 115 PID 1580 wrote to memory of 4004 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 115 PID 1580 wrote to memory of 1364 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 114 PID 1580 wrote to memory of 1364 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 114 PID 1580 wrote to memory of 1364 1580 {3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_b0fda38a27f54302777e961897fddf66_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3644
-
-
C:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exeC:\Windows\{DB6C30FA-E35C-46bf-BDCC-5B3C35C13626}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DB6C3~1.EXE > nul3⤵PID:4808
-
-
C:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exeC:\Windows\{6C5DEC48-AA95-4557-BE57-09E436A145FA}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6C5DE~1.EXE > nul4⤵PID:3104
-
-
C:\Windows\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exeC:\Windows\{BA3CB2EB-4B14-4699-A21D-4C865ED891E2}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BA3CB~1.EXE > nul5⤵PID:828
-
-
C:\Windows\{59D30B33-D5EA-45df-87A9-700460151D40}.exeC:\Windows\{59D30B33-D5EA-45df-87A9-700460151D40}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{59D30~1.EXE > nul6⤵PID:2424
-
-
C:\Windows\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exeC:\Windows\{3C987CE2-08DC-4532-9990-5B2EFF5EAA93}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3C987~1.EXE > nul7⤵PID:1364
-
-
C:\Windows\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exeC:\Windows\{1508C49D-D873-4beb-B5AF-DF18494A3A5B}.exe7⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1508C~1.EXE > nul8⤵PID:4396
-
-
C:\Windows\{76F92CB9-8DFA-407e-BC81-2B3EAF52DBEA}.exeC:\Windows\{76F92CB9-8DFA-407e-BC81-2B3EAF52DBEA}.exe8⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{76F92~1.EXE > nul9⤵PID:1316
-
-
C:\Windows\{84525BED-4F54-493a-A032-2226F57F89ED}.exeC:\Windows\{84525BED-4F54-493a-A032-2226F57F89ED}.exe9⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{84525~1.EXE > nul10⤵PID:4576
-
-
C:\Windows\{D69A0C1C-031B-4b86-AC71-831045F99A7F}.exeC:\Windows\{D69A0C1C-031B-4b86-AC71-831045F99A7F}.exe10⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D69A0~1.EXE > nul11⤵PID:3664
-
-
C:\Windows\{7DDB3750-485B-4abf-86E1-971FF1B12E2A}.exeC:\Windows\{7DDB3750-485B-4abf-86E1-971FF1B12E2A}.exe11⤵PID:992
-
C:\Windows\{EC11004E-C57D-4bd0-9B56-8D5C2AB8A31B}.exeC:\Windows\{EC11004E-C57D-4bd0-9B56-8D5C2AB8A31B}.exe12⤵PID:1388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7DDB3~1.EXE > nul12⤵PID:3804
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5568acf0bae57ce5a4d49b0161ebfeed4
SHA175f3242d25b03c6541f936a8414a23391df554a2
SHA2567a95138ee44643b33a3dad8f21f9f9e214ec44318665ad682e3b08819d512931
SHA512a46016114537444de937189a15faa18e6bdfc1c2be3e9b590dfb99cacd8494c92e6a5dff3ccb31389066ae96be0e478681ad41cd775c6954b002eb14adbfcce6
-
Filesize
344KB
MD59551fbd4722d2c033e787bdd37f46544
SHA1583c8cb65d420d098697a4d3ff1376838c3589b3
SHA256a7cdb7794eecfaac86682cafe0b11d5842099ff19a334bbfa30550142e592cdc
SHA51270539aa7ae87276f5f5266933c1258e91ecf693c37130c3f87d5f70a86d487d73af87ad8e3537fc0da00d870b380b2c3b7e78df5de5f8ac4358dba3e032c0b01