Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    63s
  • max time network
    88s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 06:03

General

  • Target

    2024-01-09_ec883f931773477798b52bcb61b8b723_goldeneye.exe

  • Size

    192KB

  • MD5

    ec883f931773477798b52bcb61b8b723

  • SHA1

    22d500debcf96265cc6974b84ba3845314a1a120

  • SHA256

    16f9ae14c1f04d1ebbc1eda01760c0cb746af9d53aaa1cb741f8eb26ae0c85e4

  • SHA512

    3feb50a08d3558022c8e81c47123420b0cc1536f32e2689f284f3b8daec30e7d01c95d3df97adc77cafa7203392271fc041904b02c79f3503f3af40dd2f03641

  • SSDEEP

    1536:1EGh0odl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0odl1OPOe2MUVg3Ve+rXfMUa

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-09_ec883f931773477798b52bcb61b8b723_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-09_ec883f931773477798b52bcb61b8b723_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
        PID:5104
      • C:\Windows\{3168BCD4-CFD1-452c-AB78-EA479F82D137}.exe
        C:\Windows\{3168BCD4-CFD1-452c-AB78-EA479F82D137}.exe
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{3168B~1.EXE > nul
          3⤵
            PID:2876
          • C:\Windows\{350ADDD8-9067-49b2-B323-98B87E7855B0}.exe
            C:\Windows\{350ADDD8-9067-49b2-B323-98B87E7855B0}.exe
            3⤵
            • Executes dropped EXE
            PID:4584
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{350AD~1.EXE > nul
              4⤵
                PID:3728
              • C:\Windows\{DB608B19-F263-4ec5-AAE8-61866687AA1D}.exe
                C:\Windows\{DB608B19-F263-4ec5-AAE8-61866687AA1D}.exe
                4⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1028
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{DB608~1.EXE > nul
                  5⤵
                    PID:4448
                  • C:\Windows\{7D867F68-51E9-44b0-B956-4C09F7502320}.exe
                    C:\Windows\{7D867F68-51E9-44b0-B956-4C09F7502320}.exe
                    5⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1816
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{7D867~1.EXE > nul
                      6⤵
                        PID:3924
                      • C:\Windows\{FC9A8518-8566-44c6-9C15-6834E548AF19}.exe
                        C:\Windows\{FC9A8518-8566-44c6-9C15-6834E548AF19}.exe
                        6⤵
                        • Executes dropped EXE
                        PID:1656
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FC9A8~1.EXE > nul
                          7⤵
                            PID:2976
                          • C:\Windows\{62078AC2-67FF-4cf6-8E36-CB9DA49DAB8B}.exe
                            C:\Windows\{62078AC2-67FF-4cf6-8E36-CB9DA49DAB8B}.exe
                            7⤵
                            • Modifies Installed Components in the registry
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4584
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{62078~1.EXE > nul
                              8⤵
                                PID:2164
                              • C:\Windows\{D12A713B-4C97-4d6e-B361-C7CD000658A4}.exe
                                C:\Windows\{D12A713B-4C97-4d6e-B361-C7CD000658A4}.exe
                                8⤵
                                  PID:1876
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{D12A7~1.EXE > nul
                                    9⤵
                                      PID:4292
                                    • C:\Windows\{1090CC93-80BC-4b03-A40C-7911E950291D}.exe
                                      C:\Windows\{1090CC93-80BC-4b03-A40C-7911E950291D}.exe
                                      9⤵
                                        PID:4952
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1090C~1.EXE > nul
                                          10⤵
                                            PID:4036
                                          • C:\Windows\{ED8836CB-141D-42fe-BCDE-16D3564F792A}.exe
                                            C:\Windows\{ED8836CB-141D-42fe-BCDE-16D3564F792A}.exe
                                            10⤵
                                              PID:2452
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{ED883~1.EXE > nul
                                                11⤵
                                                  PID:3056
                                                • C:\Windows\{58517D0F-B653-409f-A3C8-9A40B859AEAA}.exe
                                                  C:\Windows\{58517D0F-B653-409f-A3C8-9A40B859AEAA}.exe
                                                  11⤵
                                                    PID:4540
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{58517~1.EXE > nul
                                                      12⤵
                                                        PID:540
                                                      • C:\Windows\{EBA9684A-3CFC-41ee-BB3B-4BA852469100}.exe
                                                        C:\Windows\{EBA9684A-3CFC-41ee-BB3B-4BA852469100}.exe
                                                        12⤵
                                                          PID:2056

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Windows\{1090CC93-80BC-4b03-A40C-7911E950291D}.exe

                                    Filesize

                                    22KB

                                    MD5

                                    73bf9ef5561d057550eaed6e1260970b

                                    SHA1

                                    9ce905740efde18eefbcb5d6d244d6843f78e557

                                    SHA256

                                    602d65b9d9e9e1528d712305b9a5dd4d9adb9591617b3370de0ea4d2c0ee72ba

                                    SHA512

                                    794d67b88a3fb74be20c36732b5c5b875a2edcb7f6a1e13d5d90dbaf4ce60db8ee886278ab7457ff86713e365b0d82d936bd88b508fbd97b834697fc6e279034

                                  • C:\Windows\{1090CC93-80BC-4b03-A40C-7911E950291D}.exe

                                    Filesize

                                    26KB

                                    MD5

                                    85740fc1be9fbaa1ae7b6e08eb7cf415

                                    SHA1

                                    9729ca8c0683288d4397eea4edda475895bef062

                                    SHA256

                                    c45ca62178bb9b20b04d65fdbb52dcfd700e60c4330191c061110d58dd0bad7c

                                    SHA512

                                    343d9d837965aceb0fd7179bdac02ebc245b4df7f27af57b9937a275c712abe7cd06943180ce1e78f1a1f93c9f11b2c707300aed938edd9db29df13141ebd453

                                  • C:\Windows\{3168BCD4-CFD1-452c-AB78-EA479F82D137}.exe

                                    Filesize

                                    49KB

                                    MD5

                                    6bca743a89a7fb6baba5e185b3f5c23d

                                    SHA1

                                    437eab84b4870c912043d76d68d7156b2ef10b42

                                    SHA256

                                    2f1e450948ead0391ecf9dd62d4fcc5b5cef7e016ebc72f5a691e76289faf412

                                    SHA512

                                    bf38bf81b0169569351886336d0a6eed940b22077290b4a5a42d83b514d9ca961040d2257c42f793ae036319ad9db02f465d945c70643c49c9b152a3140f23d9

                                  • C:\Windows\{3168BCD4-CFD1-452c-AB78-EA479F82D137}.exe

                                    Filesize

                                    33KB

                                    MD5

                                    7b3f31f7c90db58cb997d9980f9710c9

                                    SHA1

                                    761bf5434182ac84e2c211409e3c0f06cdca4488

                                    SHA256

                                    691b20658012ed61767688986a26bc9021a2c38182ea1d8a069773327d484de8

                                    SHA512

                                    c5eb3df7c5512770cc90d4baddc1da66868f0d8cb4920d84ac6d6ef717655685c3f4b94f6b5121e61263c5330e9c4a6e48321f5274067e36162925ac1b5a0e31

                                  • C:\Windows\{350ADDD8-9067-49b2-B323-98B87E7855B0}.exe

                                    Filesize

                                    4KB

                                    MD5

                                    d388aabdab1d356fda8dd7eacc997373

                                    SHA1

                                    cd1d071247e76a4fdae215808a0d47046086dd8b

                                    SHA256

                                    35e4d5c4f0826612c349e80cdba071573bfc27b43296c4facc89faee50a5c955

                                    SHA512

                                    ee0953cc0258994a87a33a68c859cc489ad27485f67c3302b7cb22188f83c07e7531a886b997599caff89e183fe639435c98bdd1c4efa94d6dd05201eb6cd068

                                  • C:\Windows\{350ADDD8-9067-49b2-B323-98B87E7855B0}.exe

                                    Filesize

                                    8KB

                                    MD5

                                    2adaaad38b7814d65d8b1797071045d6

                                    SHA1

                                    9c9cd1d0d24aaaa540807076b95d4b086d1b6fdd

                                    SHA256

                                    84ac7ee9fd77792599c88afc53d76867c2041421082b48dbe5b87a544c9482a7

                                    SHA512

                                    c00c42376d56cdcb27ed8a75b95983252d75862b6fe6e85ab9f222cba4c190336e9e5f9aaa8a6514227af68ae85d833308ec9ea4f8250c6583c2c8a0315abce1

                                  • C:\Windows\{58517D0F-B653-409f-A3C8-9A40B859AEAA}.exe

                                    Filesize

                                    30KB

                                    MD5

                                    7a23bf9d1071ada778ed000197ba085d

                                    SHA1

                                    16f0f66e7f3be322eb93f49ae724d13691745da6

                                    SHA256

                                    7623f8a12c499d59fbfe7f08eff72c043da462764d358599d2827689cfd20901

                                    SHA512

                                    657f60c8fbafd8c01bbf7bc42475c4325140d3008a34fc652edf4d7d82135eb8e4dae0fda0ebe7ef4f012314d4c5da30b749e139a29dc8089a21503b8d8ad0bc

                                  • C:\Windows\{58517D0F-B653-409f-A3C8-9A40B859AEAA}.exe

                                    Filesize

                                    5KB

                                    MD5

                                    179986274d9cd615719fc5feeac31d38

                                    SHA1

                                    ea6399d18d39719d4f9c4178dae5d3abbe076c5a

                                    SHA256

                                    9321aa8f23fc4dcb6858f5cff5a736808e833c06c16cd36558eea40d4028f2da

                                    SHA512

                                    11c7f4bfcfe3f9751744ef100cca8d89d124c229645dc1273f10fb7a2d80fe1f8f48494ed4361bf76b34b94b3b686b266380e95730dee25518ac5ce0ed9938a0

                                  • C:\Windows\{62078AC2-67FF-4cf6-8E36-CB9DA49DAB8B}.exe

                                    Filesize

                                    70KB

                                    MD5

                                    0c9e7a1adca69b058b246a5824c63c52

                                    SHA1

                                    67b9ae6dbe39a9067f0d4967ab07ea2083a09102

                                    SHA256

                                    20ae5b3d14b652faaa817fa82b7820ba56c1a43e2d2529bff71c5fc1c87df01f

                                    SHA512

                                    abb6f08f720eaef515515c7a419329b8215320b7a844db8bf91df1f88da1805cf91c37a7754cb4bf819bfd77bfdb84b19d64e6f27e5572c45e2155c062694e29

                                  • C:\Windows\{62078AC2-67FF-4cf6-8E36-CB9DA49DAB8B}.exe

                                    Filesize

                                    51KB

                                    MD5

                                    fb87d8a857e752446b8a1ec15881d938

                                    SHA1

                                    a155999bc953bb048be76e0a5926196d69df9bd8

                                    SHA256

                                    ddb1f21cac696ea0e1f20c91658bcbc91b01fb07bba58076470a335c045463ee

                                    SHA512

                                    9e8daec7f3dc9877ff0ab7a98cd407364b912f8ecebdd292967a95639b4dbb4920b9c397bf6ca53c79a015ea640e281a41aa97bda7ceb7deb85bd6f64ec7f734

                                  • C:\Windows\{7D867F68-51E9-44b0-B956-4C09F7502320}.exe

                                    Filesize

                                    36KB

                                    MD5

                                    81d75bb711c90fd1c5d29546ff765445

                                    SHA1

                                    d8ae81e35e3be6692582f8d5f9ade0275ff35663

                                    SHA256

                                    a404c91f4dde036c07a3e98909796df40a3a169b1f7c95fc46a50fd83470e2b7

                                    SHA512

                                    3f0f5541b4c07e34c40dce1d7869aaa8011cde3a43897793636f3b4c55848c2cf83831f434dff494d04c5ca40f7f22e8fb36a40e21b683b1260bdead225e7c73

                                  • C:\Windows\{7D867F68-51E9-44b0-B956-4C09F7502320}.exe

                                    Filesize

                                    16KB

                                    MD5

                                    93ff794348c63bb175b6ba7709b3126e

                                    SHA1

                                    58c210dabce720ecfc39291c7848409d8eb8f9f2

                                    SHA256

                                    96e6e68f2b37a6b2653661e61a0d858dd6e0e8a94ec5f19238f3c9e21609bd99

                                    SHA512

                                    db369d629c2d985b2ef3e36299bfabd962982a4c281930c3da7f20cdf47c84af946957826a5a30268267b81b581e33d83a5fd12daba79de8bf3ba5db7efdb17b

                                  • C:\Windows\{D12A713B-4C97-4d6e-B361-C7CD000658A4}.exe

                                    Filesize

                                    30KB

                                    MD5

                                    db9762ae45e8d9ffd44cab02cf3e6ac4

                                    SHA1

                                    b72b748587b7274920e5d7d4d5fa929d378473f6

                                    SHA256

                                    3c54e827e1c2b380291fef4f38f85f4387bda2c57e76daba6e643466e6e03806

                                    SHA512

                                    0bb8ae5c8a871fd199f28bfeee5561d56b238c535cc45c6456b701222ff7681159d8838a88af45a8c3307ff266f2a898e1f3f2cbfcbaec928d32e02e2495e641

                                  • C:\Windows\{DB608B19-F263-4ec5-AAE8-61866687AA1D}.exe

                                    Filesize

                                    7KB

                                    MD5

                                    55d4fd662aac06b1284eb5228e4d4b66

                                    SHA1

                                    99f9c1882c0a7e4ccf2f4c6418dd010d2c128155

                                    SHA256

                                    d40ecede3388efc71850e2b85d2df84bc874d171a12ee3457d6f3a12e5bf5e91

                                    SHA512

                                    ebfc044db4861cccac03cf2359479074ef6c5aa4e12af6b4c0b452fb654bf4a4db2f6334568c4d7b3110eec6e9973bce1ea49099e61666069e6eb2804e8aed5a

                                  • C:\Windows\{DB608B19-F263-4ec5-AAE8-61866687AA1D}.exe

                                    Filesize

                                    33KB

                                    MD5

                                    570c73756832eb9f71e791b5d126ad6f

                                    SHA1

                                    5c43c3799b57a8174fcb48f6ab580583fa3b9826

                                    SHA256

                                    ceed79ec695dfa06b249e6b2c1e3c34e0de33fba0599dde28eb3f20360b9bb11

                                    SHA512

                                    071cb6d000027a03fec7278b9e8ab85a01f98f62cd9c32694c10f000d36aab2342b598fbe644874e20d8d25c3dc2898d08c104f9f2aea8f4c4d628ea0f23eb80

                                  • C:\Windows\{EBA9684A-3CFC-41ee-BB3B-4BA852469100}.exe

                                    Filesize

                                    6KB

                                    MD5

                                    9c1d2b2626645cea518ece0a85eaf4ba

                                    SHA1

                                    c5cfb00a9f404161bc279e446c5f8f793ea6492b

                                    SHA256

                                    0106a2dd938ade9acffe12e4ae367c192dfd66769f46afc5a5c53a159725d5ae

                                    SHA512

                                    30658b3e55efebc3b3f391da0bdd25e72827d1616d6d4857ca73f7550a4beba7f4df6343c4cca6d895c9c9d817864981518de43b8e62ee9601ac373a85b58801

                                  • C:\Windows\{EBA9684A-3CFC-41ee-BB3B-4BA852469100}.exe

                                    Filesize

                                    4KB

                                    MD5

                                    b9d0a8e38ca256f3d22a013a3199ac3f

                                    SHA1

                                    5b7ae0e1b81107980b2cca1bfb5ce9889dd7144f

                                    SHA256

                                    efd4eafddeebd953958d30d4fa09a7fefd18e670c7316d7ef2546244e16a071d

                                    SHA512

                                    7947244d5f2e38c427931d01a9095cddb61ca276e40f0904c99aa519ef920c159f8327ec40e06cb42157203e1fee14524a18130921c0aa65a8f871fbec539706

                                  • C:\Windows\{FC9A8518-8566-44c6-9C15-6834E548AF19}.exe

                                    Filesize

                                    7KB

                                    MD5

                                    947748480ca87cfa98b3c29fd98908e8

                                    SHA1

                                    9741d912e1e354d23b537a54c5601b3116134fee

                                    SHA256

                                    4a16d6b4cb33c0c3e3e0890973f61c14a24204e5f12791f10a7f16fd4bab174b

                                    SHA512

                                    3c9ffe1b64f13c3c140b118ca9e25247a098d1f16ce9abe300e69403aa24391f9c4a7e1ed9bb9c930ccbccfefb4f904351c189750db93d5ebcdce2bc71105a0c

                                  • C:\Windows\{FC9A8518-8566-44c6-9C15-6834E548AF19}.exe

                                    Filesize

                                    12KB

                                    MD5

                                    14541ea170a8bb0fb14d472944ad7f00

                                    SHA1

                                    da5267ce3df8ae9f73d8a6085b28e854280d853a

                                    SHA256

                                    75745fa9295754f73109273e574e0e5055352952fc9465680dc6a1826fe3513e

                                    SHA512

                                    b0d570633bb82660b3413cf4b8c1c9c229008ad07baee98274920377af3ebef7e59c7a17cafedf4564aed4d2702ccf82c86e8f2d6545065cdf1b20ecbac6d84d