Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 05:50

General

  • Target

    2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe

  • Size

    216KB

  • MD5

    5bce3ed3ae3eb59da407504b5a36d3cf

  • SHA1

    9ad63a4b29d418461570f9c6e1335e716aa71ea9

  • SHA256

    d7dd8fed90ca9b124c0f9a25c6bfc679bdf662603eaad22905e2e23ff63cfb34

  • SHA512

    e022db25419cf8fd03c329a51fcdf8dfee780df87ebe9637daa0a2ce735a98eb7d6077afdb649b7e33e79b5f3800540a3d8f733c19f1aa452cf8a938a3d0258f

  • SSDEEP

    3072:jEGh0oBl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGjlEeKcAEcGy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-10_5bce3ed3ae3eb59da407504b5a36d3cf_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe
      C:\Windows\{5BE538CC-053E-4e1a-9DB4-C1B957DA71E6}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{5BE53~1.EXE > nul
        3⤵
          PID:4908
        • C:\Windows\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe
          C:\Windows\{835D1920-8E8C-4256-B80E-4046F55CDE2E}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{835D1~1.EXE > nul
            4⤵
              PID:3164
            • C:\Windows\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe
              C:\Windows\{1FB27C83-2FB8-4c52-A586-4E017EA0ACE9}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1552
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{1FB27~1.EXE > nul
                5⤵
                  PID:2380
                • C:\Windows\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe
                  C:\Windows\{6DE61A66-2003-4ee2-A418-F03E0BB18202}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1736
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{6DE61~1.EXE > nul
                    6⤵
                      PID:1848
                    • C:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe
                      C:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe
                      6⤵
                      • Executes dropped EXE
                      PID:920
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{FC190~1.EXE > nul
                        7⤵
                          PID:1668
                        • C:\Windows\{FB30434C-E682-4eae-83C9-E6B1093BBB8A}.exe
                          C:\Windows\{FB30434C-E682-4eae-83C9-E6B1093BBB8A}.exe
                          7⤵
                            PID:4828
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{FB304~1.EXE > nul
                              8⤵
                                PID:4032
                              • C:\Windows\{B38A8A2E-15ED-4945-9C6A-551B8FD92318}.exe
                                C:\Windows\{B38A8A2E-15ED-4945-9C6A-551B8FD92318}.exe
                                8⤵
                                  PID:2740
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{B38A8~1.EXE > nul
                                    9⤵
                                      PID:1824
                                    • C:\Windows\{67EB973C-1570-45b4-8A5B-40B8B3310AB0}.exe
                                      C:\Windows\{67EB973C-1570-45b4-8A5B-40B8B3310AB0}.exe
                                      9⤵
                                        PID:4740
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{67EB9~1.EXE > nul
                                          10⤵
                                            PID:2412
                                          • C:\Windows\{E1B72A60-5255-4468-BFD2-E64A76A754B6}.exe
                                            C:\Windows\{E1B72A60-5255-4468-BFD2-E64A76A754B6}.exe
                                            10⤵
                                              PID:2448
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del C:\Windows\{E1B72~1.EXE > nul
                                                11⤵
                                                  PID:4044
                                                • C:\Windows\{8B37FAC6-AA47-4758-864F-76366E222A01}.exe
                                                  C:\Windows\{8B37FAC6-AA47-4758-864F-76366E222A01}.exe
                                                  11⤵
                                                    PID:436
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{8B37F~1.EXE > nul
                                                      12⤵
                                                        PID:4848
                                                      • C:\Windows\{111ADA33-AC0E-4ffb-B9AD-E5276F4BB572}.exe
                                                        C:\Windows\{111ADA33-AC0E-4ffb-B9AD-E5276F4BB572}.exe
                                                        12⤵
                                                          PID:4356
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                                      2⤵
                                        PID:2764

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\{FC190635-B2F4-4c3b-91F2-D2AB677FE164}.exe

                                      Filesize

                                      216KB

                                      MD5

                                      e1677eaff26a77a59228ef29593ca621

                                      SHA1

                                      a531480035ba1c75ee5ba6e8fb743eff1e3729d8

                                      SHA256

                                      c128b1dfd9f625438cfc152f74dd0ce9c4ae8e3303b6bfc7110d745a17ad38ab

                                      SHA512

                                      4a2246e7912786301a3b20fe8dbbf41e6739cfc01fa443ba04c7cab471ed851958dbb29d83d268f890980933a05199670a3c9dd02d294d0224d7ca92d59d983b