Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 06:45

General

  • Target

    2024-01-08_9cd49b1b7bec8cb0701913d84553af82_goldeneye.exe

  • Size

    168KB

  • MD5

    9cd49b1b7bec8cb0701913d84553af82

  • SHA1

    355a4b637da3de97678841f6ee702af95dc00d5a

  • SHA256

    ee815f26d1fa69f8a179c778c17917b0385bbd3c51de0ada58b761d7c858ea7d

  • SHA512

    848a933aee3d96886e6391bf70b96de8624f9c40c13aaa362d54f60715efa58dca05fa075563276e378ca88100e0a9ca101445383dbe52628e20c0dca7f0c828

  • SSDEEP

    1536:1EGh0oZlq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0oZlqOPOe2MUVg3Ve+rX

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-08_9cd49b1b7bec8cb0701913d84553af82_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-08_9cd49b1b7bec8cb0701913d84553af82_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2812
    • C:\Windows\{BB94FD06-690B-4391-8CEB-3E9063452689}.exe
      C:\Windows\{BB94FD06-690B-4391-8CEB-3E9063452689}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{BB94F~1.EXE > nul
        3⤵
          PID:2784
        • C:\Windows\{94120B24-F05F-468d-9797-2F64A419BA84}.exe
          C:\Windows\{94120B24-F05F-468d-9797-2F64A419BA84}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{94120~1.EXE > nul
            4⤵
              PID:2632
            • C:\Windows\{98873774-B4A9-4798-9D22-41736DBA5D20}.exe
              C:\Windows\{98873774-B4A9-4798-9D22-41736DBA5D20}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2752
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{98873~1.EXE > nul
                5⤵
                  PID:2868
                • C:\Windows\{3FC4B624-AEB9-444d-941E-C6350A1249F0}.exe
                  C:\Windows\{3FC4B624-AEB9-444d-941E-C6350A1249F0}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1716
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{3FC4B~1.EXE > nul
                    6⤵
                      PID:1912
                    • C:\Windows\{3EB018F4-FA69-4248-8B35-485BA25B3427}.exe
                      C:\Windows\{3EB018F4-FA69-4248-8B35-485BA25B3427}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2616
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{3EB01~1.EXE > nul
                        7⤵
                          PID:2232
                        • C:\Windows\{919956CA-2941-41b9-BC51-CD42B04A95CC}.exe
                          C:\Windows\{919956CA-2941-41b9-BC51-CD42B04A95CC}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2488
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{91995~1.EXE > nul
                            8⤵
                              PID:688
                            • C:\Windows\{9AE456BF-6706-48f9-9EDD-A977EF0C4B3D}.exe
                              C:\Windows\{9AE456BF-6706-48f9-9EDD-A977EF0C4B3D}.exe
                              8⤵
                              • Executes dropped EXE
                              PID:1576
                              • C:\Windows\{E82898E8-6574-446a-A83D-E6D211166BF4}.exe
                                C:\Windows\{E82898E8-6574-446a-A83D-E6D211166BF4}.exe
                                9⤵
                                  PID:1100
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{E8289~1.EXE > nul
                                    10⤵
                                      PID:2060
                                    • C:\Windows\{C5976463-7B45-4772-A269-D5D4017892D6}.exe
                                      C:\Windows\{C5976463-7B45-4772-A269-D5D4017892D6}.exe
                                      10⤵
                                        PID:1276
                                        • C:\Windows\{8CEC0F49-80C6-49bd-83EB-D1ECC43A7ED7}.exe
                                          C:\Windows\{8CEC0F49-80C6-49bd-83EB-D1ECC43A7ED7}.exe
                                          11⤵
                                            PID:2972
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{8CEC0~1.EXE > nul
                                              12⤵
                                                PID:1668
                                              • C:\Windows\{B988BB8C-E057-4cf9-A612-F822E8D07BFF}.exe
                                                C:\Windows\{B988BB8C-E057-4cf9-A612-F822E8D07BFF}.exe
                                                12⤵
                                                  PID:580
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{C5976~1.EXE > nul
                                                11⤵
                                                  PID:2988
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del C:\Windows\{9AE45~1.EXE > nul
                                              9⤵
                                                PID:1360

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{3EB018F4-FA69-4248-8B35-485BA25B3427}.exe

                                Filesize

                                6KB

                                MD5

                                8f37cf3706565939ea59140d76fbdb37

                                SHA1

                                3c408d9f4ace20f15f567b7f9b1e315c590ed3c2

                                SHA256

                                fa12df46883c7a7051ebaa7964e31a951227e5edf028d118781c12621ec51961

                                SHA512

                                9ea3847b678f187b1577e2bf1bbad5ddfc37b43fe643334c76d16a11541bf177d8ac40c0a25598456912b6436e77227eb349dc59fb186c15420a0246d9fb7f7a

                              • C:\Windows\{3FC4B624-AEB9-444d-941E-C6350A1249F0}.exe

                                Filesize

                                38KB

                                MD5

                                ce7cdb1714c0f9e9865bc60d938a0b84

                                SHA1

                                c4a22559259b3f4b63789f8f96f48004d5829f29

                                SHA256

                                e9071787d27f3f3c78cda1c207182c6c43aa5841e1880a85345e6d1cbff8998a

                                SHA512

                                04ca3647bf1ee53d852a5e9e26d7d7e9914a0160f494f10c7aa10cd341c1ef2c88706184509329fd5e8e39fbfbcc308384110d8335fddb309714b82a645a27f9

                              • C:\Windows\{8CEC0F49-80C6-49bd-83EB-D1ECC43A7ED7}.exe

                                Filesize

                                20KB

                                MD5

                                fffef4e0be5d52e69d3f879071dcff23

                                SHA1

                                8341aa91caf57602327a273d1a8ffea385751b22

                                SHA256

                                0b82866eb1f73e0de93e8cfc5a25ab953d3004ca5ec3240d397082608d78abb6

                                SHA512

                                3d9ddcaf90b04aaed8a9b0575a4514382fc629dfc419648d5b1f22b7c0e217b833706cb2a165d99b6067c7c41b26b77ae83a6bb6e89f08520cf67c3cb29ebe5b

                              • C:\Windows\{8CEC0F49-80C6-49bd-83EB-D1ECC43A7ED7}.exe

                                Filesize

                                50KB

                                MD5

                                4fcfc6272c578dd0cecdca38101f52b9

                                SHA1

                                52ab1aa9029b00bac6ceec828a1e4adb77958f43

                                SHA256

                                c4356f475ffb3c534e43b62099839b6e0795abdef6b72dce56dd1a6745095077

                                SHA512

                                d6e6dafaf1f911df17ba8283d049a46993be04354a714d93883bdab7c903f3cd295b98488fe9650032cf3234243654a74032dfcda9d8515875bc32e741bb9881

                              • C:\Windows\{919956CA-2941-41b9-BC51-CD42B04A95CC}.exe

                                Filesize

                                55KB

                                MD5

                                9af7648017b33e843e34adec672064eb

                                SHA1

                                726073895e301e2f9744d19434a2647dcee36f72

                                SHA256

                                f8ef0af6eb9223b71bf3c1426b9deae6ebba12730e61e5542d5c9926f350d891

                                SHA512

                                ccff27b015cc33093bb3e882fdf54edf77f7e38c6a73dc95a84a4968a53c5b3d580d12a090110b89305a51310875d9a4fea13ad80a33902c80e710e156458751

                              • C:\Windows\{919956CA-2941-41b9-BC51-CD42B04A95CC}.exe

                                Filesize

                                9KB

                                MD5

                                cbe56cf01291240ef57a8be68e21955e

                                SHA1

                                e7afdb90deea76d9a694e389a29303f26cdc4545

                                SHA256

                                97fe2a2735a40afe1602e367abd2d8d58bed0642499b0375059bb14c720cdbe2

                                SHA512

                                47911024b5cc4afc738bd09fe9749ecbd73ee82a853e320ec415f4a6e1b4340cf56b74b4db6727f882127b6e70de37fb3596f39b9ec4caed6d32453f1a8b9a8d

                              • C:\Windows\{94120B24-F05F-468d-9797-2F64A419BA84}.exe

                                Filesize

                                62KB

                                MD5

                                66f97fd38a779fb5572bcf9294f5a23f

                                SHA1

                                59734636fb7c93030b8520cdc5a1b7f424cc6928

                                SHA256

                                e8f6652973beb920c94e42a55d9d5b1db3c9bb334dfd44dd6429172ac8e449a9

                                SHA512

                                54c657a854c210add4248ee82362da25f9a4945d6d290ec34027eb545e956141cb353e48c1970d11386948926b1471e6c24bb4d3cb4678460eaaa09ad996a901

                              • C:\Windows\{94120B24-F05F-468d-9797-2F64A419BA84}.exe

                                Filesize

                                33KB

                                MD5

                                02626a4993d5fbfd74ebf8a43c51632a

                                SHA1

                                ce166dd69fe5d3c0efb3ded12996a001677b87b6

                                SHA256

                                93a6750faf63cc12390d565ef5ba75126007856ace066116e31a58879873f4fc

                                SHA512

                                807c9b81b36ecf03f0c8c9440bdd9e7d7e90ac4c0cf831016c269de99ad71c8ad787502dc81936cdb75ae797c86bce16a95595fdba7a23919cb7b7e7797046ac

                              • C:\Windows\{98873774-B4A9-4798-9D22-41736DBA5D20}.exe

                                Filesize

                                16KB

                                MD5

                                a751d191594949e78aef8e1ba8f9d226

                                SHA1

                                162591d8a38ca789c687eeb7c97da094b7f0a566

                                SHA256

                                9a038395558dc826d8b87ace318e108baccccec9d6c4839320b38b8f3c71aacc

                                SHA512

                                3a1e8fd43bc4b16873a5cf31dbd52af9b1ce91af77a82cfd1ce5f91f5517f2c68c755da11a9ed872f2bf0cee419fd1aa0cce9225d8413928e51edec4bd75fb43

                              • C:\Windows\{98873774-B4A9-4798-9D22-41736DBA5D20}.exe

                                Filesize

                                63KB

                                MD5

                                ef2882f0bb8c431d6aef8cfa289c9858

                                SHA1

                                ef36c866eb42b98b1e8a5895cef07b8bcb2d2f43

                                SHA256

                                ed6168d0a404f936338675266cd43993d627e10f7bb56649dd5a707f54a92bbd

                                SHA512

                                be15e3e92b8d226cdc63663a5e5e62f665f4a13d3b394961c68c849f52e7af17962055be0c02d0d249a01c85dff93e4944403ab2fc73695f126057912eedc3ea

                              • C:\Windows\{9AE456BF-6706-48f9-9EDD-A977EF0C4B3D}.exe

                                Filesize

                                34KB

                                MD5

                                ddb8f3f588708ef1795b20ea4e79c8bc

                                SHA1

                                05460813a12cc91247ad61dbfdb51dd31611e470

                                SHA256

                                178359e21f2957f5b44f64bbccce3585ec03ff4999789efd1f09e4b17a9a10a1

                                SHA512

                                b0296a98e2fbb5d9cb152ff9a48f643fa8957c93ee0b6f45ae28417c8602e130925346f4516850d1b8bb7aa7f10cf5117a43d31a80315b52f26ebb9b43f11995

                              • C:\Windows\{9AE456BF-6706-48f9-9EDD-A977EF0C4B3D}.exe

                                Filesize

                                23KB

                                MD5

                                974d05a2c2f0ec817c91293c270254ba

                                SHA1

                                622b39fcd3343ad20f00abf0953782ddd0df2822

                                SHA256

                                460c4d3e5417c5343bb65b3d8a0121cca885e3fc7c06b53747e71e911a9b88ff

                                SHA512

                                b2ddbc946ef13d49f3f99eaa9b922feeeb7d7d00c57253f887a96703e996fad014ac6cc05d986799cbe5fa6f646843960ca0b187f8682f27ad02bbce957a0424

                              • C:\Windows\{B988BB8C-E057-4cf9-A612-F822E8D07BFF}.exe

                                Filesize

                                42KB

                                MD5

                                e3483dd811df3df6a24a3bdb92fbeeaf

                                SHA1

                                a596449a68cb8c41ee41734e5589d86a6db4c6a2

                                SHA256

                                cedbfc77d7ea5171dc7fb4fe6bbbf55ce38956b878f4d927965d62699a89dbc9

                                SHA512

                                15adc82b39f339c64d2f9bf15e939ba73f50f2e4d1612da04fdfb8e47eb584d7060be14cf3d8904d391c7477dcc1885b150229c3e08cb064121d7466873aedcc

                              • C:\Windows\{BB94FD06-690B-4391-8CEB-3E9063452689}.exe

                                Filesize

                                60KB

                                MD5

                                c4ceebd6a662d33f29fc577e9b6e4629

                                SHA1

                                5ea5ce8ad85114c46d29f07897fe18ddc9926b38

                                SHA256

                                370f5c465009d90117622bdf395e09d3643925c45671ec5d313bdcf3a99e4ad3

                                SHA512

                                4e9b0f0cc6940c458a2550d01774544b064e4f6d27fc7450579edbdbcd1461923d8508e852671ebac82efb9ba7ca88ed9d05502e98c5975fd0f9631102616178

                              • C:\Windows\{BB94FD06-690B-4391-8CEB-3E9063452689}.exe

                                Filesize

                                92KB

                                MD5

                                7c4ce1534be3643e5459d1249c9cac5a

                                SHA1

                                89671c0e0fd66b28b90e1ee908f94a550da87546

                                SHA256

                                334cb50df3b3b345bba906b12d97e02f89f0556ff43a443b455646621691b084

                                SHA512

                                c82c2deb1dc91d655baca0d6b40a6a6639fe9a53298523c1fba3b6d20315ca19a011ba7f0a671d285dee9e581a9ad17c10d02a10942d3ee87f3d5be3b284e678

                              • C:\Windows\{BB94FD06-690B-4391-8CEB-3E9063452689}.exe

                                Filesize

                                54KB

                                MD5

                                7a4622306193994999805453dd8363cb

                                SHA1

                                4a5db475f214f1c3cb79c6ce02775dd3143e3792

                                SHA256

                                249d2868ecaad6866a9343d5e83af9f08250089f662b4cff2d74ac8b8e7bcfbf

                                SHA512

                                b56b723e5ce384dba26ab5c9e42991d24fc90f922ff080a53657a2b485af23569f93f73371b44a1dac8dbb39c3c4eaad6bac558907afc14899b96724d3ebeffb

                              • C:\Windows\{C5976463-7B45-4772-A269-D5D4017892D6}.exe

                                Filesize

                                12KB

                                MD5

                                59e471e3b9a4e2f5a29dfe655ad32810

                                SHA1

                                48bb1ae69661a7369595792ed8d06a8b08fca2be

                                SHA256

                                bd28d35614678b3ac9a37eb7f115254b79abcdc49d3778fc7c02a57094370649

                                SHA512

                                c2f500183b96257f6621de0496b81eac781994796ce6fbd4a53e61c32e043620f82acaf2b9530874ef6a9642b0bc0d304445946a3e504631d6086c53ed0e0189

                              • C:\Windows\{C5976463-7B45-4772-A269-D5D4017892D6}.exe

                                Filesize

                                50KB

                                MD5

                                38727c6f0c6cf8fb44440e3bc61506f7

                                SHA1

                                10c89831787fe9c29af057d68344f70743f4d737

                                SHA256

                                aa765fef29f97c024a737126bd775a359094a801719a7bf3666f93052f03cfe5

                                SHA512

                                c9d87283b277021be135d99b305a22455410448b9dba85f41587336e310c102622c1677f7c68eafe25158f41e83dad1d4bcb521f8fb990f2bc71f368a9dc2939

                              • C:\Windows\{E82898E8-6574-446a-A83D-E6D211166BF4}.exe

                                Filesize

                                18KB

                                MD5

                                9429ebb43a3fe02c59792336df2bfdaf

                                SHA1

                                400f05e41e770e2a700cb28f48526756341323a2

                                SHA256

                                9f45bc61d924354d535f17069a2dd1227427a4a326d400ab562c32ac3dc2fd78

                                SHA512

                                7300eee50c698c33f6a85aede48e052d9a50779bfba8052c75124d09dee0aef3dfe95112a44a1c3702a3a08f74480ce0d03230f7d10d2d4a89d31e06a8de414d

                              • C:\Windows\{E82898E8-6574-446a-A83D-E6D211166BF4}.exe

                                Filesize

                                18KB

                                MD5

                                cc1ea668fe24a75f6571a5f505ce6f29

                                SHA1

                                2794e7b6869a7a91cc5428cb8a55027d559ddc54

                                SHA256

                                831b7724b09da7123bb4862552f20a93f27f8535c92ad5098b11754adbdca39a

                                SHA512

                                5c4c4c584fee3ffc986772f01b17ab343bfff5de54d1131752ecc7b801a92577f0ac736ec37a676861fac11ef92d79e60efe3cd2eb4c5b53909cdf125ffe60b9