Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
-
Size
408KB
-
MD5
7865d41c4b524454773eafecbf07bc45
-
SHA1
4105ddbb317ee2c5ecac583185df3fe17e47f41c
-
SHA256
ad0bd98641fbf53bdf6680bccad43973f58133439457c06d20287c49988664b5
-
SHA512
0d21c304ea511f5865be664713ce8fc74b78f41266a4448d793041fc73f66f5e0dc89871fb3b793552c79d825cbc6131ff5ea03f81b6ac421622fde177e49191
-
SSDEEP
3072:CEGh0o1l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG/ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6335A84-DD38-4b01-8804-F5DFE214990D}\stubpath = "C:\\Windows\\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exe" {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{466E1228-0AB8-4c29-8106-D486C69972DF} {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2773F71B-8D11-4ab1-A330-9A8594396EDE} 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9D7AA17-8399-46d6-92D7-C81948F82EC0} {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B6335A84-DD38-4b01-8804-F5DFE214990D} {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{466E1228-0AB8-4c29-8106-D486C69972DF}\stubpath = "C:\\Windows\\{466E1228-0AB8-4c29-8106-D486C69972DF}.exe" {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EE438E2-483F-4e5b-AB66-4344DFEED341} {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}\stubpath = "C:\\Windows\\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe" {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}\stubpath = "C:\\Windows\\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe" {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AAC0C81-76F8-4239-BF96-79F7732EC49E} {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}\stubpath = "C:\\Windows\\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe" {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2773F71B-8D11-4ab1-A330-9A8594396EDE}\stubpath = "C:\\Windows\\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe" 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7EE438E2-483F-4e5b-AB66-4344DFEED341}\stubpath = "C:\\Windows\\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe" {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F} {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe -
Deletes itself 1 IoCs
pid Process 2872 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 1076 {466E1228-0AB8-4c29-8106-D486C69972DF}.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe File created C:\Windows\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe File created C:\Windows\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe File created C:\Windows\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe File created C:\Windows\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe File created C:\Windows\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exe {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe File created C:\Windows\{466E1228-0AB8-4c29-8106-D486C69972DF}.exe {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Token: SeIncBasePriorityPrivilege 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe Token: SeIncBasePriorityPrivilege 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe Token: SeIncBasePriorityPrivilege 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe Token: SeIncBasePriorityPrivilege 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe Token: SeIncBasePriorityPrivilege 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe Token: SeIncBasePriorityPrivilege 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1936 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 29 PID 2544 wrote to memory of 1936 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 29 PID 2544 wrote to memory of 1936 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 29 PID 2544 wrote to memory of 1936 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 29 PID 2544 wrote to memory of 2872 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 28 PID 2544 wrote to memory of 2872 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 28 PID 2544 wrote to memory of 2872 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 28 PID 2544 wrote to memory of 2872 2544 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 28 PID 1936 wrote to memory of 2608 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 31 PID 1936 wrote to memory of 2608 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 31 PID 1936 wrote to memory of 2608 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 31 PID 1936 wrote to memory of 2608 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 31 PID 1936 wrote to memory of 2676 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 30 PID 1936 wrote to memory of 2676 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 30 PID 1936 wrote to memory of 2676 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 30 PID 1936 wrote to memory of 2676 1936 {2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe 30 PID 2608 wrote to memory of 2720 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 33 PID 2608 wrote to memory of 2720 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 33 PID 2608 wrote to memory of 2720 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 33 PID 2608 wrote to memory of 2720 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 33 PID 2608 wrote to memory of 2744 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 32 PID 2608 wrote to memory of 2744 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 32 PID 2608 wrote to memory of 2744 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 32 PID 2608 wrote to memory of 2744 2608 {7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe 32 PID 2720 wrote to memory of 2580 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 37 PID 2720 wrote to memory of 2580 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 37 PID 2720 wrote to memory of 2580 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 37 PID 2720 wrote to memory of 2580 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 37 PID 2720 wrote to memory of 2692 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 36 PID 2720 wrote to memory of 2692 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 36 PID 2720 wrote to memory of 2692 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 36 PID 2720 wrote to memory of 2692 2720 {4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe 36 PID 2580 wrote to memory of 956 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 39 PID 2580 wrote to memory of 956 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 39 PID 2580 wrote to memory of 956 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 39 PID 2580 wrote to memory of 956 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 39 PID 2580 wrote to memory of 936 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 38 PID 2580 wrote to memory of 936 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 38 PID 2580 wrote to memory of 936 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 38 PID 2580 wrote to memory of 936 2580 {F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe 38 PID 956 wrote to memory of 1700 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 41 PID 956 wrote to memory of 1700 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 41 PID 956 wrote to memory of 1700 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 41 PID 956 wrote to memory of 1700 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 41 PID 956 wrote to memory of 1512 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 40 PID 956 wrote to memory of 1512 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 40 PID 956 wrote to memory of 1512 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 40 PID 956 wrote to memory of 1512 956 {F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe 40 PID 1700 wrote to memory of 1076 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 43 PID 1700 wrote to memory of 1076 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 43 PID 1700 wrote to memory of 1076 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 43 PID 1700 wrote to memory of 1076 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 43 PID 1700 wrote to memory of 2436 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 42 PID 1700 wrote to memory of 2436 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 42 PID 1700 wrote to memory of 2436 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 42 PID 1700 wrote to memory of 2436 1700 {B6335A84-DD38-4b01-8804-F5DFE214990D}.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2872
-
-
C:\Windows\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exeC:\Windows\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2773F~1.EXE > nul3⤵PID:2676
-
-
C:\Windows\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exeC:\Windows\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7EE43~1.EXE > nul4⤵PID:2744
-
-
C:\Windows\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exeC:\Windows\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4AAC0~1.EXE > nul5⤵PID:2692
-
-
C:\Windows\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exeC:\Windows\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9510~1.EXE > nul6⤵PID:936
-
-
C:\Windows\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exeC:\Windows\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F9D7A~1.EXE > nul7⤵PID:1512
-
-
C:\Windows\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exeC:\Windows\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6335~1.EXE > nul8⤵PID:2436
-
-
C:\Windows\{466E1228-0AB8-4c29-8106-D486C69972DF}.exeC:\Windows\{466E1228-0AB8-4c29-8106-D486C69972DF}.exe8⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{466E1~1.EXE > nul9⤵PID:1412
-
-
C:\Windows\{35E2B5C1-881F-4fbb-B5D2-7E9C03234609}.exeC:\Windows\{35E2B5C1-881F-4fbb-B5D2-7E9C03234609}.exe9⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35E2B~1.EXE > nul10⤵PID:2240
-
-
C:\Windows\{CCE39E89-5151-4829-8FE1-CA5CF7465629}.exeC:\Windows\{CCE39E89-5151-4829-8FE1-CA5CF7465629}.exe10⤵PID:2712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CCE39~1.EXE > nul11⤵PID:668
-
-
C:\Windows\{087D9CCD-EA7E-45aa-AC13-2D12F490A8A6}.exeC:\Windows\{087D9CCD-EA7E-45aa-AC13-2D12F490A8A6}.exe11⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{087D9~1.EXE > nul12⤵PID:1628
-
-
C:\Windows\{7447EC77-13BE-48a3-A7A7-D134E6E9AEFD}.exeC:\Windows\{7447EC77-13BE-48a3-A7A7-D134E6E9AEFD}.exe12⤵PID:1620
-
-
-
-
-
-
-
-
-
-
-