Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe
-
Size
380KB
-
MD5
1c3b0cac6ef7f77f5568e703e435e1ca
-
SHA1
72223b32312e2f879e834df12cdd5601fb03fca8
-
SHA256
0b085ae04be55c927ca560265dca477b7c246664e77a6ba7907e2487b802e215
-
SHA512
8d05c1deb2c92806ad0146c0a0409d829b22f5ac88f7642b0ae3551f53d42e8708372330986412f065857895fc141bd76fc10c039818e5961de4005c762e8009
-
SSDEEP
3072:mEGh0oZlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGvl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFDE7566-10A7-43de-A423-DF69255F19E4} 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFDE7566-10A7-43de-A423-DF69255F19E4}\stubpath = "C:\\Windows\\{EFDE7566-10A7-43de-A423-DF69255F19E4}.exe" 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20DBD983-A3F0-434e-BA35-8FBC151957F9} {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20DBD983-A3F0-434e-BA35-8FBC151957F9}\stubpath = "C:\\Windows\\{20DBD983-A3F0-434e-BA35-8FBC151957F9}.exe" {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B524DD8F-FFEC-480f-88CD-7525E0817ABE} {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B524DD8F-FFEC-480f-88CD-7525E0817ABE}\stubpath = "C:\\Windows\\{B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe" {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{713624C7-7F8D-49ae-896E-95978E350BDE}\stubpath = "C:\\Windows\\{713624C7-7F8D-49ae-896E-95978E350BDE}.exe" {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C5E372B-4BFA-4941-A7D2-B87C703750A8} {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C5E372B-4BFA-4941-A7D2-B87C703750A8}\stubpath = "C:\\Windows\\{4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe" {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{713624C7-7F8D-49ae-896E-95978E350BDE} {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe -
Executes dropped EXE 5 IoCs
pid Process 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 5096 {713624C7-7F8D-49ae-896E-95978E350BDE}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe File created C:\Windows\{713624C7-7F8D-49ae-896E-95978E350BDE}.exe {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe File created C:\Windows\{EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe File created C:\Windows\{4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe File created C:\Windows\{20DBD983-A3F0-434e-BA35-8FBC151957F9}.exe {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe Token: SeIncBasePriorityPrivilege 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe Token: SeIncBasePriorityPrivilege 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe Token: SeIncBasePriorityPrivilege 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe Token: SeIncBasePriorityPrivilege 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3968 wrote to memory of 688 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 101 PID 3968 wrote to memory of 688 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 101 PID 3968 wrote to memory of 688 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 101 PID 3968 wrote to memory of 3940 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 100 PID 3968 wrote to memory of 3940 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 100 PID 3968 wrote to memory of 3940 3968 2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe 100 PID 688 wrote to memory of 1284 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 103 PID 688 wrote to memory of 1284 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 103 PID 688 wrote to memory of 1284 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 103 PID 688 wrote to memory of 3332 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 102 PID 688 wrote to memory of 3332 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 102 PID 688 wrote to memory of 3332 688 {EFDE7566-10A7-43de-A423-DF69255F19E4}.exe 102 PID 1284 wrote to memory of 4064 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 115 PID 1284 wrote to memory of 4064 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 115 PID 1284 wrote to memory of 4064 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 115 PID 1284 wrote to memory of 4504 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 107 PID 1284 wrote to memory of 4504 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 107 PID 1284 wrote to memory of 4504 1284 {4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe 107 PID 4064 wrote to memory of 2536 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 110 PID 4064 wrote to memory of 2536 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 110 PID 4064 wrote to memory of 2536 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 110 PID 4064 wrote to memory of 3968 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 109 PID 4064 wrote to memory of 3968 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 109 PID 4064 wrote to memory of 3968 4064 {8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe 109 PID 2536 wrote to memory of 5096 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 112 PID 2536 wrote to memory of 5096 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 112 PID 2536 wrote to memory of 5096 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 112 PID 2536 wrote to memory of 4324 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 111 PID 2536 wrote to memory of 4324 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 111 PID 2536 wrote to memory of 4324 2536 {B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_1c3b0cac6ef7f77f5568e703e435e1ca_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:3940
-
-
C:\Windows\{EFDE7566-10A7-43de-A423-DF69255F19E4}.exeC:\Windows\{EFDE7566-10A7-43de-A423-DF69255F19E4}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EFDE7~1.EXE > nul3⤵PID:3332
-
-
C:\Windows\{4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exeC:\Windows\{4C5E372B-4BFA-4941-A7D2-B87C703750A8}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\{20DBD983-A3F0-434e-BA35-8FBC151957F9}.exeC:\Windows\{20DBD983-A3F0-434e-BA35-8FBC151957F9}.exe4⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{20DBD~1.EXE > nul5⤵PID:3968
-
-
C:\Windows\{B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exeC:\Windows\{B524DD8F-FFEC-480f-88CD-7525E0817ABE}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B524D~1.EXE > nul6⤵PID:4324
-
-
C:\Windows\{713624C7-7F8D-49ae-896E-95978E350BDE}.exeC:\Windows\{713624C7-7F8D-49ae-896E-95978E350BDE}.exe6⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{71362~1.EXE > nul7⤵PID:4352
-
-
C:\Windows\{8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exeC:\Windows\{8DE54C0E-39F1-469d-9B8B-673D023BB7FD}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8DE54~1.EXE > nul8⤵PID:1412
-
-
C:\Windows\{40D46849-B07F-42a5-9E85-8579C9832AC1}.exeC:\Windows\{40D46849-B07F-42a5-9E85-8579C9832AC1}.exe8⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40D46~1.EXE > nul9⤵PID:3976
-
-
C:\Windows\{4AC5C55E-7563-46e9-8552-63E4D0AC99BF}.exeC:\Windows\{4AC5C55E-7563-46e9-8552-63E4D0AC99BF}.exe9⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AC5C~1.EXE > nul10⤵PID:3240
-
-
C:\Windows\{E17F1837-F587-4b32-BB30-C053ED562918}.exeC:\Windows\{E17F1837-F587-4b32-BB30-C053ED562918}.exe10⤵PID:2356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E17F1~1.EXE > nul11⤵PID:4840
-
-
C:\Windows\{089E106D-133A-48be-974B-53D14542EBCB}.exeC:\Windows\{089E106D-133A-48be-974B-53D14542EBCB}.exe11⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{089E1~1.EXE > nul12⤵PID:4700
-
-
C:\Windows\{B8146729-8E3F-49d1-A7F1-1DAD8D1BF1DD}.exeC:\Windows\{B8146729-8E3F-49d1-A7F1-1DAD8D1BF1DD}.exe12⤵PID:4368
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4C5E3~1.EXE > nul4⤵PID:4504
-
-
-