Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe
-
Size
216KB
-
MD5
5bce3ed3ae3eb59da407504b5a36d3cf
-
SHA1
9ad63a4b29d418461570f9c6e1335e716aa71ea9
-
SHA256
d7dd8fed90ca9b124c0f9a25c6bfc679bdf662603eaad22905e2e23ff63cfb34
-
SHA512
e022db25419cf8fd03c329a51fcdf8dfee780df87ebe9637daa0a2ce735a98eb7d6077afdb649b7e33e79b5f3800540a3d8f733c19f1aa452cf8a938a3d0258f
-
SSDEEP
3072:jEGh0oBl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGjlEeKcAEcGy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}\stubpath = "C:\\Windows\\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe" {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DE61A66-2003-4ee2-A418-F03E0BB18202}\stubpath = "C:\\Windows\\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe" {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6} 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{835D1920-8E8C-4256-B80E-4046F55CDE2E}\stubpath = "C:\\Windows\\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe" {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9} {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DE61A66-2003-4ee2-A418-F03E0BB18202} {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC190635-B2F4-4c3b-91F2-D2AB677FE164} {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}\stubpath = "C:\\Windows\\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe" {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}\stubpath = "C:\\Windows\\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe" 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{835D1920-8E8C-4256-B80E-4046F55CDE2E} {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe -
Executes dropped EXE 5 IoCs
pid Process 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 920 {FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe File created C:\Windows\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe File created C:\Windows\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe File created C:\Windows\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe File created C:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe Token: SeIncBasePriorityPrivilege 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe Token: SeIncBasePriorityPrivilege 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe Token: SeIncBasePriorityPrivilege 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe Token: SeIncBasePriorityPrivilege 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2376 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 100 PID 2116 wrote to memory of 2376 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 100 PID 2116 wrote to memory of 2376 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 100 PID 2116 wrote to memory of 2764 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 101 PID 2116 wrote to memory of 2764 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 101 PID 2116 wrote to memory of 2764 2116 2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe 101 PID 2376 wrote to memory of 2224 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 103 PID 2376 wrote to memory of 2224 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 103 PID 2376 wrote to memory of 2224 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 103 PID 2376 wrote to memory of 4908 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 102 PID 2376 wrote to memory of 4908 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 102 PID 2376 wrote to memory of 4908 2376 {5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe 102 PID 2224 wrote to memory of 1552 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 106 PID 2224 wrote to memory of 1552 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 106 PID 2224 wrote to memory of 1552 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 106 PID 2224 wrote to memory of 3164 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 105 PID 2224 wrote to memory of 3164 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 105 PID 2224 wrote to memory of 3164 2224 {835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe 105 PID 1552 wrote to memory of 1736 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 109 PID 1552 wrote to memory of 1736 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 109 PID 1552 wrote to memory of 1736 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 109 PID 1552 wrote to memory of 2380 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 108 PID 1552 wrote to memory of 2380 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 108 PID 1552 wrote to memory of 2380 1552 {1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe 108 PID 1736 wrote to memory of 920 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 111 PID 1736 wrote to memory of 920 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 111 PID 1736 wrote to memory of 920 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 111 PID 1736 wrote to memory of 1848 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 110 PID 1736 wrote to memory of 1848 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 110 PID 1736 wrote to memory of 1848 1736 {6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exeC:\Windows\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5BE53~1.EXE > nul3⤵PID:4908
-
-
C:\Windows\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exeC:\Windows\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{835D1~1.EXE > nul4⤵PID:3164
-
-
C:\Windows\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exeC:\Windows\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1FB27~1.EXE > nul5⤵PID:2380
-
-
C:\Windows\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exeC:\Windows\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6DE61~1.EXE > nul6⤵PID:1848
-
-
C:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exeC:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe6⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC190~1.EXE > nul7⤵PID:1668
-
-
C:\Windows\{FB30434C-E682-4eae-83C9-E6B1093BBB8A}.exeC:\Windows\{FB30434C-E682-4eae-83C9-E6B1093BBB8A}.exe7⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FB304~1.EXE > nul8⤵PID:4032
-
-
C:\Windows\{B38A8A2E-15ED-4945-9C6A-551B8FD92318}.exeC:\Windows\{B38A8A2E-15ED-4945-9C6A-551B8FD92318}.exe8⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B38A8~1.EXE > nul9⤵PID:1824
-
-
C:\Windows\{67EB973C-1570-45b4-8A5B-40B8B3310AB0}.exeC:\Windows\{67EB973C-1570-45b4-8A5B-40B8B3310AB0}.exe9⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{67EB9~1.EXE > nul10⤵PID:2412
-
-
C:\Windows\{E1B72A60-5255-4468-BFD2-E64A76A754B6}.exeC:\Windows\{E1B72A60-5255-4468-BFD2-E64A76A754B6}.exe10⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E1B72~1.EXE > nul11⤵PID:4044
-
-
C:\Windows\{8B37FAC6-AA47-4758-864F-76366E222A01}.exeC:\Windows\{8B37FAC6-AA47-4758-864F-76366E222A01}.exe11⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8B37F~1.EXE > nul12⤵PID:4848
-
-
C:\Windows\{111ADA33-AC0E-4ffb-B9AD-E5276F4BB572}.exeC:\Windows\{111ADA33-AC0E-4ffb-B9AD-E5276F4BB572}.exe12⤵PID:4356
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5e1677eaff26a77a59228ef29593ca621
SHA1a531480035ba1c75ee5ba6e8fb743eff1e3729d8
SHA256c128b1dfd9f625438cfc152f74dd0ce9c4ae8e3303b6bfc7110d745a17ad38ab
SHA5124a2246e7912786301a3b20fe8dbbf41e6739cfc01fa443ba04c7cab471ed851958dbb29d83d268f890980933a05199670a3c9dd02d294d0224d7ca92d59d983b