Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    189s
  • max time network
    218s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 05:45

General

  • Target

    2024-01-10_09b052b259a1146cfec5f332089c2d8e_goldeneye.exe

  • Size

    180KB

  • MD5

    09b052b259a1146cfec5f332089c2d8e

  • SHA1

    fb0718b51db55f120347de226cb3fa343f7950d8

  • SHA256

    38c8fb05f8ce388a8ddd02e39dcc1928037e3a325c5e919ea0bb8b9753441393

  • SHA512

    3a9d928f29e135e38c7e6b49c88c447de507c1ff5837503f7b224083f75bc3fe55efb2c2403c04a15aeb6407faeb8c27c057216dd00457b1e368af21881221bc

  • SSDEEP

    3072:jEGh0oMlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEGyl5eKcAEc

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 20 IoCs
  • Executes dropped EXE 10 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_09b052b259a1146cfec5f332089c2d8e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_09b052b259a1146cfec5f332089c2d8e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Windows\{B273EDB8-B6AF-4259-95C7-F2886A214598}.exe
      C:\Windows\{B273EDB8-B6AF-4259-95C7-F2886A214598}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{B273E~1.EXE > nul
        3⤵
          PID:4984
        • C:\Windows\{4247AB66-C148-4d27-A210-98AE41E4A2AA}.exe
          C:\Windows\{4247AB66-C148-4d27-A210-98AE41E4A2AA}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3712
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{4247A~1.EXE > nul
            4⤵
              PID:4980
            • C:\Windows\{2D71DA80-2CEE-413e-8476-0ECD216A51F1}.exe
              C:\Windows\{2D71DA80-2CEE-413e-8476-0ECD216A51F1}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3408
              • C:\Windows\{74060B4B-D59F-41fd-A1A0-C59B6701BBFD}.exe
                C:\Windows\{74060B4B-D59F-41fd-A1A0-C59B6701BBFD}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2536
                • C:\Windows\{E10B49D9-DC29-4231-B75A-F4121D33CEF2}.exe
                  C:\Windows\{E10B49D9-DC29-4231-B75A-F4121D33CEF2}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1188
                  • C:\Windows\{5572A2B3-A588-4279-AF06-1E44D07E18D8}.exe
                    C:\Windows\{5572A2B3-A588-4279-AF06-1E44D07E18D8}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1312
                    • C:\Windows\{952779BE-4430-461b-B5FB-A1E8EAA64B68}.exe
                      C:\Windows\{952779BE-4430-461b-B5FB-A1E8EAA64B68}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4292
                      • C:\Windows\{387E017D-802E-4faa-B5F2-4A7064F0F286}.exe
                        C:\Windows\{387E017D-802E-4faa-B5F2-4A7064F0F286}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4604
                        • C:\Windows\{C09AC486-CD75-45b1-9E25-392F116A0319}.exe
                          C:\Windows\{C09AC486-CD75-45b1-9E25-392F116A0319}.exe
                          10⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4176
                          • C:\Windows\{7F17A167-BA58-4ecb-896E-3E2FB8FE5547}.exe
                            C:\Windows\{7F17A167-BA58-4ecb-896E-3E2FB8FE5547}.exe
                            11⤵
                            • Executes dropped EXE
                            PID:2408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C09AC~1.EXE > nul
                            11⤵
                              PID:4656
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{387E0~1.EXE > nul
                            10⤵
                              PID:3972
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{95277~1.EXE > nul
                            9⤵
                              PID:416
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5572A~1.EXE > nul
                            8⤵
                              PID:4640
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E10B4~1.EXE > nul
                            7⤵
                              PID:2372
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{74060~1.EXE > nul
                            6⤵
                              PID:4932
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2D71D~1.EXE > nul
                            5⤵
                              PID:4920
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                        2⤵
                          PID:896

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{2D71DA80-2CEE-413e-8476-0ECD216A51F1}.exe

                        Filesize

                        5KB

                        MD5

                        00867a7d504be5fb031101c2050f9bb9

                        SHA1

                        1e2cdeba51e41d81713eba021b269fc0c7f4530b

                        SHA256

                        229c08cf8ea1198e9827ec146a8ef445e2d0a1eccb1358ea8953e82bd7536a60

                        SHA512

                        aa2ca57eccf9c8f2113051ee0371e20c3f03f4927c822a05ea87da16b23be0ad2c4d0872ef00c610f9b8909f7d539f4ce0c9a64c4edac0a6c9d90fef89417f5f

                      • C:\Windows\{2D71DA80-2CEE-413e-8476-0ECD216A51F1}.exe

                        Filesize

                        57KB

                        MD5

                        c6e1266407cf358af066d566450e8a10

                        SHA1

                        e4737c49eef376cfc14ab325a706884d37bc6ae0

                        SHA256

                        368aa4159ef4eae4218ed2abe89334712e434fc997fbf2c601342ce42bdd7e9c

                        SHA512

                        6212dc20a24c387b212822f3e4ebddf3c2c82779d4012f780e7a33940664f284e75dc2afc6f71565fc784db2968733cae3df4665b4a42b70635b147fd4e486b7

                      • C:\Windows\{387E017D-802E-4faa-B5F2-4A7064F0F286}.exe

                        Filesize

                        180KB

                        MD5

                        6dd1b75e9c74bcc47d0ef6e0fcf245ea

                        SHA1

                        ff069b668932ce1fdcf5a1fbab710cf4c2ae5196

                        SHA256

                        c9904630056dda04d9faa151889780944e2e2ccca5049fbf9a55a14ebdbdfc70

                        SHA512

                        64fef8ea0ce7f3b2452fbdf35160d294d957be347a9448eb5c5f39f6514b313caf86ebdf6f41903459dbe704a424b3680dc36e6fa0af8ae3ab8dc1e9d36f4af2

                      • C:\Windows\{4247AB66-C148-4d27-A210-98AE41E4A2AA}.exe

                        Filesize

                        32KB

                        MD5

                        6054c4657ff135b6ec1d76762f66c475

                        SHA1

                        72a5c93011759e35d36200da7cf99e9180b25f4c

                        SHA256

                        6ea10e5d4f8eeaf5775d5f4fc815cf60c826cfa9abd11e565a86487625be2e46

                        SHA512

                        53dab11e274782568e506e814ec86fef197b817bb749012e78a3637215c16293802837f7c6037aec71b736417f16aece2c76309c07673f6c26cdb692ca46097c

                      • C:\Windows\{5572A2B3-A588-4279-AF06-1E44D07E18D8}.exe

                        Filesize

                        180KB

                        MD5

                        6b642430a4d70e1f72f623fd25001fa2

                        SHA1

                        9c12c5227ca0d7952dc3928f7c85bab250d3ceee

                        SHA256

                        8dd000843466928178677885d3c1a071077a3381b3ed2c62109eeb5776cb2c9b

                        SHA512

                        193a0575f3d93f76e5f67c976b35b95256705e71ed134b95d4dae869bc4e4945b459acd1f7d7cd4b5db21353d55ebbb5314eecfcfe8c223c59866dbe1ddb511f

                      • C:\Windows\{74060B4B-D59F-41fd-A1A0-C59B6701BBFD}.exe

                        Filesize

                        31KB

                        MD5

                        04e6bf7331f72db670c52da5cc794317

                        SHA1

                        0a7c1093fb60a25281e16e9ffed72361093d5947

                        SHA256

                        7c3f08b8f4dcbf4f64d2cd9ba9c69e12297ed86062e0108c1285b7fc1c15cb7a

                        SHA512

                        b550cdf2f6ee69f1eb98aeec10a7940ceb82a5c6599c1ea8fb3a511b01c5c06fdb5f478aaa319dcd53bf09a08c0ac39e655838980688bb6de312da0cfe519c34

                      • C:\Windows\{7F17A167-BA58-4ecb-896E-3E2FB8FE5547}.exe

                        Filesize

                        180KB

                        MD5

                        3e10a5a7d1dc05d2760de67b7430d057

                        SHA1

                        fec1a3095e6a97f9a7f113cb6d9c91c0d3840271

                        SHA256

                        91ffc2ad1f1b0f1476a8679688bc793657fa194aa8f03098c6ef342082ade1c6

                        SHA512

                        da5d2ac5853c64964fc8b1eff7659b6d2b11b5f0638bc2bdc77679813d3ac5f6b66b114079f1a576a1afcc094515e3b616e499cd808703e0169c4c58256fc74c

                      • C:\Windows\{952779BE-4430-461b-B5FB-A1E8EAA64B68}.exe

                        Filesize

                        180KB

                        MD5

                        727ee28aecc59e2b12d35ea589d8d8f0

                        SHA1

                        ac8703f459d2e9394b1000d1098ca904e119a1b5

                        SHA256

                        f2500a92d47d371072bec3f0e0dad0a34aebec43c73140677be5aa7e8986f6d1

                        SHA512

                        2d0c5876b591afa7da2ffa4bbf71c82cbbf7d700611693b66a10f09323ce8bed479d1f71b17dbcc0d43cd82acc7db09209e41653a7e96cf51e48a84c3bb7a6e4

                      • C:\Windows\{B273EDB8-B6AF-4259-95C7-F2886A214598}.exe

                        Filesize

                        37KB

                        MD5

                        2fe1ae40e3e7b3c4f2f3331df7e50d97

                        SHA1

                        fafa685da8369c634db6e40081df6e431cee2562

                        SHA256

                        74beb01583e52261bfebb47fa050ed36db419546376f8cab0dac0c0982a7b3ae

                        SHA512

                        5f748f2f8db25acc720c837c8e188e0a2ffdc85164b308e097d0b89e0dbb444189b1405d3fd45ef516d9afc33e23d905321484a5210f7d2e0862e3a38562e207

                      • C:\Windows\{B273EDB8-B6AF-4259-95C7-F2886A214598}.exe

                        Filesize

                        1KB

                        MD5

                        4bc0c8a9188ba80b6b1d123f1538b01c

                        SHA1

                        f970f1d1eb981593f5dce6c92a843c45a5c93db2

                        SHA256

                        8d808b2a37d78acca7fb3cf18ce2a6c378433f6f09a1700955074eec9d0673ec

                        SHA512

                        c9ee2ff3915c0df23c16a774bcd2e4a8584e4d938b10e998e95e7095975d88c825c7d1d681916823e64f9076d739769afadff629f6aa608e4e14a41b9d5b5bd4

                      • C:\Windows\{C09AC486-CD75-45b1-9E25-392F116A0319}.exe

                        Filesize

                        180KB

                        MD5

                        32aeccac5c2fd94911ec6424dbe0d747

                        SHA1

                        af4d6bd9710478dfa1270719320a68ce27bba125

                        SHA256

                        012dede6555f9033670fdebbccc50e825f9aee0acc05390a68b3d7ec0f0fac08

                        SHA512

                        f851ea02b9ca56c9e568518ca37247492fb5d1b29051c1ec172c92baac05ca236760d0d8eac34685fce34b8152c3d7c7718bef00a40dbed55a0208b562c95392

                      • C:\Windows\{E10B49D9-DC29-4231-B75A-F4121D33CEF2}.exe

                        Filesize

                        180KB

                        MD5

                        7826ed50e88b1cb583ced6f5bb205650

                        SHA1

                        b5e0fb461570b1b3350448f6b21757a3da3c1d7d

                        SHA256

                        954194ef54e282107cd04bdfede4cdfce8decd4c87096c4dd4ec90e64860b476

                        SHA512

                        88e206cd955e6a58dd5c4ed7b5663b4fa293964686dc6acb51bcc333915b99a33c078b25b7bb6ac31b414ce130e6572864231d22af95cfe4423d78fa2f4a8a76

                      • C:\Windows\{E10B49D9-DC29-4231-B75A-F4121D33CEF2}.exe

                        Filesize

                        149KB

                        MD5

                        4134b2d230d2def6b8f4c7be11cffa1f

                        SHA1

                        e852bdc4cbbdd008a372ad73c486b356fdad0683

                        SHA256

                        370f110dec53f71326df5a8c46bb669742daa5e13ffbf44243f7a2cefbb4f9e8

                        SHA512

                        5452870e0aeaa61c0b8432e44eec453ca27ed1c0c7b7f8bd9ecd6678dfc9bdc0b4b4e789e6e07571c8e478664f899061b50ed263c32fa205ffc00205bf283175