Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
-
Size
344KB
-
MD5
ab1277242a6b4aa8e18db0602804abc0
-
SHA1
56fa4481f7a8c06b4e9b4d38f3b16c920aa56c85
-
SHA256
ba7c061fc829aacb4170b9fca8d6337b8c3324cdbdbfcbfdb26d2a92d06f7d2b
-
SHA512
71fdd5e615ed9aefb4bc76770b188c7cdcb8d7a0bb0215143a63adec048b64f2b32e103ff3e5e328018e25ab31083d385c97ece733e92561a4cdc0bd99ed823d
-
SSDEEP
3072:mEGh0ozlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGJlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BCAC947-B848-4f91-9A29-C444F9ECB819} 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8BCAC947-B848-4f91-9A29-C444F9ECB819}\stubpath = "C:\\Windows\\{8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe" 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D} {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}\stubpath = "C:\\Windows\\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}.exe" {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 2464 {7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\{8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe File created C:\Windows\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}.exe {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Token: SeIncBasePriorityPrivilege 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1824 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 29 PID 2352 wrote to memory of 1824 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 29 PID 2352 wrote to memory of 1824 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 29 PID 2352 wrote to memory of 1824 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 29 PID 2352 wrote to memory of 2696 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 28 PID 2352 wrote to memory of 2696 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 28 PID 2352 wrote to memory of 2696 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 28 PID 2352 wrote to memory of 2696 2352 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 28 PID 1824 wrote to memory of 2464 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 31 PID 1824 wrote to memory of 2464 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 31 PID 1824 wrote to memory of 2464 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 31 PID 1824 wrote to memory of 2464 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 31 PID 1824 wrote to memory of 2852 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 30 PID 1824 wrote to memory of 2852 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 30 PID 1824 wrote to memory of 2852 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 30 PID 1824 wrote to memory of 2852 1824 {8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2696
-
-
C:\Windows\{8BCAC947-B848-4f91-9A29-C444F9ECB819}.exeC:\Windows\{8BCAC947-B848-4f91-9A29-C444F9ECB819}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8BCAC~1.EXE > nul3⤵PID:2852
-
-
C:\Windows\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}.exeC:\Windows\{7C46610D-FEA1-43ce-A2A8-FD2A1F16477D}.exe3⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7C466~1.EXE > nul4⤵PID:2704
-
-
C:\Windows\{301A992F-668B-41ee-BC2D-6FE169A35793}.exeC:\Windows\{301A992F-668B-41ee-BC2D-6FE169A35793}.exe4⤵PID:2848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD50309d1aa5771497cb131ea9295039b5a
SHA1db64205795d4b2d213f302da1f96ce727d85bee0
SHA256ae39a4e060678adee29d136f1900f18f6d19c9b77a6fe9526a29b7392f455ab9
SHA512edd92bcdd63d2119140420eeb2854cedf766ee73745974011ec43c86451f00a1a90977d4afac60c6155e39253a881a8a53218592048899adbd8f9c4558dd8cca