Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 06:01

General

  • Target

    2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe

  • Size

    408KB

  • MD5

    7865d41c4b524454773eafecbf07bc45

  • SHA1

    4105ddbb317ee2c5ecac583185df3fe17e47f41c

  • SHA256

    ad0bd98641fbf53bdf6680bccad43973f58133439457c06d20287c49988664b5

  • SHA512

    0d21c304ea511f5865be664713ce8fc74b78f41266a4448d793041fc73f66f5e0dc89871fb3b793552c79d825cbc6131ff5ea03f81b6ac421622fde177e49191

  • SSDEEP

    3072:CEGh0o1l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG/ldOe2MUVg3vTeKcAEciTBqr3jy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 14 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2872
    • C:\Windows\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe
      C:\Windows\{2773F71B-8D11-4ab1-A330-9A8594396EDE}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{2773F~1.EXE > nul
        3⤵
          PID:2676
        • C:\Windows\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe
          C:\Windows\{7EE438E2-483F-4e5b-AB66-4344DFEED341}.exe
          3⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{7EE43~1.EXE > nul
            4⤵
              PID:2744
            • C:\Windows\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe
              C:\Windows\{4AAC0C81-76F8-4239-BF96-79F7732EC49E}.exe
              4⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2720
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{4AAC0~1.EXE > nul
                5⤵
                  PID:2692
                • C:\Windows\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe
                  C:\Windows\{F95102F6-D10B-4a3d-963F-50DFF7C28F2F}.exe
                  5⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2580
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{F9510~1.EXE > nul
                    6⤵
                      PID:936
                    • C:\Windows\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe
                      C:\Windows\{F9D7AA17-8399-46d6-92D7-C81948F82EC0}.exe
                      6⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:956
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{F9D7A~1.EXE > nul
                        7⤵
                          PID:1512
                        • C:\Windows\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exe
                          C:\Windows\{B6335A84-DD38-4b01-8804-F5DFE214990D}.exe
                          7⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1700
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{B6335~1.EXE > nul
                            8⤵
                              PID:2436
                            • C:\Windows\{466E1228-0AB8-4c29-8106-D486C69972DF}.exe
                              C:\Windows\{466E1228-0AB8-4c29-8106-D486C69972DF}.exe
                              8⤵
                              • Executes dropped EXE
                              PID:1076
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{466E1~1.EXE > nul
                                9⤵
                                  PID:1412
                                • C:\Windows\{35E2B5C1-881F-4fbb-B5D2-7E9C03234609}.exe
                                  C:\Windows\{35E2B5C1-881F-4fbb-B5D2-7E9C03234609}.exe
                                  9⤵
                                    PID:1376
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{35E2B~1.EXE > nul
                                      10⤵
                                        PID:2240
                                      • C:\Windows\{CCE39E89-5151-4829-8FE1-CA5CF7465629}.exe
                                        C:\Windows\{CCE39E89-5151-4829-8FE1-CA5CF7465629}.exe
                                        10⤵
                                          PID:2712
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del C:\Windows\{CCE39~1.EXE > nul
                                            11⤵
                                              PID:668
                                            • C:\Windows\{087D9CCD-EA7E-45aa-AC13-2D12F490A8A6}.exe
                                              C:\Windows\{087D9CCD-EA7E-45aa-AC13-2D12F490A8A6}.exe
                                              11⤵
                                                PID:2268
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{087D9~1.EXE > nul
                                                  12⤵
                                                    PID:1628
                                                  • C:\Windows\{7447EC77-13BE-48a3-A7A7-D134E6E9AEFD}.exe
                                                    C:\Windows\{7447EC77-13BE-48a3-A7A7-D134E6E9AEFD}.exe
                                                    12⤵
                                                      PID:1620

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads